state size
Recently Published Documents


TOTAL DOCUMENTS

103
(FIVE YEARS 35)

H-INDEX

17
(FIVE YEARS 4)

2021 ◽  
pp. 74-82
Author(s):  
Микола Вікторович Руженцев ◽  
Семен Сергійович Жила ◽  
Володимир Володимирович Павліков ◽  
Гліб Сергійович Черепнін ◽  
Анатолій Владиславович Попов ◽  
...  

Due to the impossibility of hiding the unmanned aerial vehicles (UAV) own radiothermal radiation or reducing its contrast against the background of atmospheric radiation, it is advisable to use highly sensitive radiometric receivers to solve the detection problem. The optimal method for complexing the results of measurements in multichannel radiometric receivers and identifying different types and classes of UAV against the sky in X, Ka, and W wave ranges under different meteorological conditions has been developed. end-to-end optimization of methods and algorithms will reveal the theoretical foundations of the construction of radiometric systems, ranging from the field of registration of electromagnetic fields to the final stages. In cloudless and clear weather, radiometric measurements in the W range will allow to obtain high-precision estimates of the spatial position of UAVs, in the X range of reliable observations in rain, snow, fog. The use of the Ka-band receiver in the radiometric complex will allow to realize the best sensitivity due to the technical achievements of domestic production in the creation of broadband radiometric receivers in this waveband. Studies of the main parameters of UAV detection have been conducted, namely, the probability of erroneous detection alarm and the probability of correct detection. The obtained theoretical results allow to determine signal processing algorithms and optimal structures of radiometric receivers, to analyze the maximum measurement error and to develop recommendations for experiments. Having received a database of radiometric contrasts, it is possible to further implement technical solutions to increase the capabilities of airspace monitoring for UAV detection. Recommendations are given for the practical choice of the UAV detection threshold to ensure the probability of correct detection is not worse than 0.9 for different angles of observation, atmospheric state, size and material of manufacture.


Author(s):  
Xavier Bonnetain ◽  
Samuel Jaques

We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant. These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048. They are faster than other collision algorithms, and the attacks against PRINCE and Chaskey are the most efficient known to date. As Elephant has a key smaller than its state size, the algorithm is less efficient and its cost ends up very close to or above the cost of exhaustive search.We also propose an optimized quantum circuit for boolean linear algebra as well as complete reversible implementations of PRINCE, Chaskey, spongent and Keccak which are of independent interest for quantum cryptanalysis. We stress that our attacks could be applied in the future against today’s communications, and recommend caution when choosing symmetric constructions for cases where long-term security is expected.


2021 ◽  
Vol 0 (128) ◽  
pp. 27-58
Author(s):  
Fidel Olivera ◽  
◽  
Guillermo Olivera ◽  

The cycle of formal employment during 2020, following the Covid-19 pandemic, is analyzed in three stages: paralysis with destruction, interrupted recovery, and relapse. Likewise, using data from the Mexican Social Security Institute on monthly changes to the numbers of insured workers, it was possible to identify the impact of govern-ment management, and trace the history of infection provoked by the disease, in lost or gained employment at each stage. Changes to the numbers of those in employment are illustrated by the economic sector, state, size of economic unit, salary range, sex and age group of the workers. The highest rate of unemployment was in tourism and recre-ational services, the most populous states with dense metropolitan areas, medium and large economic units, among young workers, the very young and those over 60 years old, and those with the worst wages. It is estimated that it will take at least until 2022 for the quality of work to recover and the accumulated deficit to be restored


2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Xing Qin ◽  
Chu Wu ◽  
Dechao Niu ◽  
Limei Qin ◽  
Xia Wang ◽  
...  

AbstractPeroxisome, a special cytoplasmic organelle, possesses one or more kinds of oxidases for hydrogen peroxide (H2O2) production and catalase for H2O2 degradation, which serves as an intracellular H2O2 regulator to degrade toxic peroxides to water. Inspired by this biochemical pathway, we demonstrate the reactive oxygen species (ROS) induced tumor therapy by integrating lactate oxidase (LOx) and catalase (CAT) into Fe3O4 nanoparticle/indocyanine green (ICG) co-loaded hybrid nanogels (designated as FIGs-LC). Based on the O2 redistribution and H2O2 activation by cascading LOx and CAT catalytic metabolic regulation, hydroxyl radical (·OH) and singlet oxygen (1O2) production can be modulated for glutathione (GSH)-activated chemodynamic therapy (CDT) and NIR-triggered photodynamic therapy (PDT), by manipulating the ratio of LOx and CAT to catalyze endogenous lactate to produce H2O2 and further cascade decomposing H2O2 into O2. The regulation reactions of FIGs-LC significantly elevate the intracellular ROS level and cause fatal damage to cancer cells inducing the effective inhibition of tumor growth. Such enzyme complex loaded hybrid nanogel present potential for biomedical ROS regulation, especially for the tumors with different redox state, size, and subcutaneous depth.


Author(s):  
Steven M. Karceski ◽  
Edgar Kiser

In this chapter we explore the connection between taxation and quality of government. Taxation represents an important interaction between citizens and the state, thus the way in which tax policies are organized has important implications for the quality of government. The first part of the chapter describes three different perspectives on quality of government: The first relates to administrative impartiality, the second to state size and economic growth, and the last to democracy. It then explores how each perspective holds distinct prescriptions for the design of tax policy. The latter part of the chapter applies the conclusions on the three perspectives to discuss exemplary cases of each over different historical periods. It concludes with a discussion of path dependence and the difficulty of maintaining a high quality of government in the long run.


Author(s):  
Yusuke Naito ◽  
Yu Sasaki ◽  
Takeshi Sugawara

In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory. The primary design goal, backward compatibility, is motivated by the fact that AES accelerators are now very common for devices in the field; we are interested in designing an efficient and highly secure mode of operation that exploits the best of those AES accelerators. The backward compatibility receives little attention in the NIST lightweight cryptography standardization process, in which only 3 out of 32 round-2 candidates are based on AES. Our mode, LBBB, is inspired by the design of ALE in the sense that the internal state size is a minimum 2n bits when using a block cipher of length n bits for the key and data. Unfortunately, there is no security proof of ALE, and forgery attacks have been found on ALE. In LBBB, we introduce an additional feed from block cipher’s output to the key state via a certain permutation λ, which enables us to prove beyond-birthday-bound (BBB) security. We then specify its AES instance, AES-LBBB, and evaluate its performance for (i) software implementation on a microcontroller with an AES coprocessor and (ii) hardware implementation for an application-specific integrated circuit (ASIC) to show that AES-LBBB performs better than the current state-of-the-art Remus-N2 with AES-128.


Author(s):  
Kosei Sakamoto ◽  
Fukang Liu ◽  
Yuto Nakano ◽  
Shinsaku Kiyomoto ◽  
Takanori Isobe

In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design strategy is to take full advantage of the AES-NI and SIMD instructions as that of the AEGIS family and Tiaoxin-346. Although Jean and Nikolić have generalized the way to construct efficient round functions using only one round of AES (aesenc) and 128-bit XOR operation and have found several efficient candidates, there still seems to exist potential to further improve it regarding speed and state size. In order to minimize the critical path of one round, we remove the case of applying both aesenc and XOR in a cascade way for one round. By introducing a cost-free block permutation in the round function, we are able to search for candidates in a larger space without sacrificing the performance. Consequently, we obtain more efficient constructions with a smaller state size than candidates by Jean and Nikolić. Based on the newly-discovered round function, we carefully design the corresponding AEAD scheme with 256-bit security by taking several reported attacks on the AEGIS family and Tiaxion-346 into account. Our AEAD scheme can reach 138Gbps which is 4 times faster than the AEAD scheme of SNOW-V. Rocca is also much faster than other efficient schemes with 256-bit key length, e.g. AEGIS-256 and AES-256-GCM. As far as we know, Rocca is the first dedicated cryptographic algorithm targeting 6 systems, i.e., 256-bit key length and the speed of more than 100 Gbps.


2021 ◽  
Vol 13 (1) ◽  
pp. 39-59
Author(s):  
Balázs Varga ◽  
Márton Balassi ◽  
Attila Kiss

Abstract Data stream processing has been gaining attention in the past decade. Apache Flink is an open-source distributed stream processing engine that is able to process a large amount of data in real time with low latency. Computations are distributed among a cluster of nodes. Currently, provisioning the appropriate amount of cloud resources must be done manually ahead of time. A dynamically varying workload may exceed the capacity of the cluster, or leave resources underutilized. In our paper, we describe an architecture that enables the automatic scaling of Flink jobs on Kubernetes based on custom metrics, and describe a simple scaling policy. We also measure the e ects of state size and target parallelism on the duration of the scaling operation, which must be considered when designing an autoscaling policy, so that the Flink job respects a Service Level Agreement.


Nano Research ◽  
2021 ◽  
Author(s):  
Hao Wu ◽  
Xiaoyu Cheng ◽  
Hongguang Dong ◽  
Songjun Xie ◽  
Sailing He

Sign in / Sign up

Export Citation Format

Share Document