685 research outputs found

    New Bounds on Augmenting Steps of Block-Structured Integer Programs

    Get PDF
    Iterative augmentation has recently emerged as an overarching method for solving Integer Programs (IP) in variable dimension, in stark contrast with the volume and flatness techniques of IP in fixed dimension. Here we consider 4-block n-fold integer programs, which are the most general class considered so far. A 4-block n-fold IP has a constraint matrix which consists of n copies of small matrices A, B, and D, and one copy of C, in a specific block structure. Iterative augmentation methods rely on the so-called Graver basis of the constraint matrix, which constitutes a set of fundamental augmenting steps. All existing algorithms rely on bounding the ??- or ?_?-norm of elements of the Graver basis. Hemmecke et al. [Math. Prog. 2014] showed that 4-block n-fold IP has Graver elements of ?_?-norm at most ?_FPT(n^{2^{s_D}}), leading to an algorithm with a similar runtime; here, s_D is the number of rows of matrix D and ?_FPT hides a multiplicative factor that is only dependent on the small matrices A,B,C,D, However, it remained open whether their bounds are tight, in particular, whether they could be improved to ?_FPT(1), perhaps at least in some restricted cases. We prove that the ?_?-norm of the Graver elements of 4-block n-fold IP is upper bounded by ?_FPT(n^{s_D}), improving significantly over the previous bound ?_FPT(n^{2^{s_D}}). We also provide a matching lower bound of ?(n^{s_D}) which even holds for arbitrary non-zero lattice elements, ruling out augmenting algorithm relying on even more restricted notions of augmentation than the Graver basis. We then consider a special case of 4-block n-fold in which C is a zero matrix, called 3-block n-fold IP. We show that while the ?_?-norm of its Graver elements is ?(n^{s_D}), there exists a different decomposition into lattice elements whose ?_?-norm is bounded by ?_FPT(1), which allows us to provide improved upper bounds on the ?_?-norm of Graver elements for 3-block n-fold IP. The key difference between the respective decompositions is that a Graver basis guarantees a sign-compatible decomposition; this property is critical in applications because it guarantees each step of the decomposition to be feasible. Consequently, our improved upper bounds let us establish faster algorithms for 3-block n-fold IP and 4-block IP, and our lower bounds strongly hint at parameterized hardness of 4-block and even 3-block n-fold IP. Furthermore, we show that 3-block n-fold IP is without loss of generality in the sense that 4-block n-fold IP can be solved in FPT oracle time by taking an algorithm for 3-block n-fold IP as an oracle

    Marine Target Detection from Nonstationary Sea-Clutter Based On Topological Data Analysis

    Get PDF
    AbstractDue to the instinct complexity and the large scale non-stationary of so-called sea-clutter, radar backscatters from ocean surface, it is always challenging to detect the weak marine target. In classical statistical approaches, the seaclutter is modeled as several kinds of stochastic processes, which are found inadequate, especially in high sea-state circumstances. Therefore it is reasonable to discover the underlying dynamics that is responsible for generating the time series of sea-clutter. In this work, we take into account of the marine target detection from the X-Band seaclutter datasets with low Signal-Clutter-Ratio, and propose adequate methods to process these non-stationary data, including Empirical Mode Decomposition and Topological Data Analysis. Both theoretical simulation and experimental results indicate the proposed method's usefulness of for marine target detection, which is implemented by extract different structural features from measured sea-clutter data

    Watermarking protocol of secure verification

    Get PDF
    The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark extracted from the copy and sends it to an arbitrator. Without the knowledge of permutations applied by the seller, the arbitrator is unable to remove the permuted watermark from the digital content. Hence, verification is secured. As an additional advantage of the proposed protocol, arbitration can be conducted without the need for the cooperation of the WCA or the buyer

    An Empirical Study of AI-based Smart Contract Creation

    Full text link
    The introduction of large language models (LLMs) like ChatGPT and Google Palm2 for smart contract generation seems to be the first well-established instance of an AI pair programmer. LLMs have access to a large number of open-source smart contracts, enabling them to utilize more extensive code in Solidity than other code generation tools. Although the initial and informal assessments of LLMs for smart contract generation are promising, a systematic evaluation is needed to explore the limits and benefits of these models. The main objective of this study is to assess the quality of generated code provided by LLMs for smart contracts. We also aim to evaluate the impact of the quality and variety of input parameters fed to LLMs. To achieve this aim, we created an experimental setup for evaluating the generated code in terms of validity, correctness, and efficiency. Our study finds crucial evidence of security bugs getting introduced in the generated smart contracts as well as the overall quality and correctness of the code getting impacted. However, we also identified the areas where it can be improved. The paper also proposes several potential research directions to improve the process, quality and safety of generated smart contract codes.Comment: Updated to address issue

    A Secure and Flexible FPGA–based Blockchain System for IIoTs

    Get PDF
    Blockchain is a promising solution for Industry 4.0 due to its traceability and immutability. However, blockchain itself does not guarantee the input data integrity. The tampered data from an endpoint device can be a significant problem because it may result in a cascaded negative effect on the whole smart factory operations. In this paper, we propose an FPGA-based private blockchain system for IIoTs, where the transaction generation is performed inside the FPGA in an isolated and enclaved manner. For the key confidentiality and transaction integrity, the proposed system utilizes a PUF, soft processor, and tightly coupled sensor connections inside the FPGA fabric. Since all the critical operations are hidden under the hood, adversaries even with the root privilege cannot intervene in the transaction generation process. The implemented IIoT device provides 33 transactions per minute and consumes a 191 mW of power

    Downregulation of CDKN2A and suppression of cyclin D1 gene expressions in malignant gliomas

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Malignant gliomas are the most common in central nervous system cancer. Genome-wide association study identifies that CDKN2A was a susceptibility loci for glioma. The CDKN2A/cyclin-dependent kinase 4, 6/Retinoblastoma protein (Rb) pathway is thought to play a crucial role in malignant gliomas pathogenesis. We have investigated the expression of CDKN2A for potential correlations with malignant gliomas grade and potential role of CDKN2A on malignant gliomas pathogenesis.</p> <p>Methods</p> <p>Tumour tissue samples from 61 patients suffering from malignant gliomas were investigated. The expression levels of CDKN2A were detected using immunohistochemical staining and western blot. Overexpression and knockdown of CDKN2A were performed in human glioma cell lines. Subsequently, colony formation, growth curves and CDKN2A-Cyclin-Rb pathway were analyzed.</p> <p>Results</p> <p>Here we show that a lower expression of CDKN2A and a higher expression of cyclin D1 in the patients with high-grade malignant gliomas than low-grade gliomas, respectively. Moreover, overexpression of CDKN2A inhibits growth of glioma cell lines by suppression of cyclin D1 gene expression.</p> <p>Conclusions</p> <p>Our study suggests that CDKN2A as a malignant gliomas suppressor gene, appears to be useful for predicting behaviour of high-grade malignant gliomas. CDKN2A-Cyclin-Rb pathway plays a key role on malignant gliomas formation and that therapeutic targeting of this pathway may be useful in malignant gliomas treatment.</p

    Ananas comosus

    Get PDF
    In this study, we aimed to investigate the effect and action mechanisms of pineapple leaf phenols (PLPs) on liver fat metabolism in high-fat diet-fed mice. Results show that PLP significantly reduced abdominal fat and liver lipid accumulation in high-fat diet-fed mice. The effects of PLP were comparable with those of FB. Furthermore, at the protein level, PLP upregulated the expression of carnitine palmitoyltransferase 1 (CPT-1), whereas FB had no effects on CPT-1 compared with the HFD controls. Regarding mRNA expression, PLP mainly promoted the expression of CPT-1, PGC1a, UCP-1, and AMPK in the mitochondria, whereas FB mostly enhanced the expression of Ech1, Acox1, Acaa1, and Ehhadh in peroxisomes. PLP seemed to enhance fat metabolism in the mitochondria, whereas FB mainly exerted the effect in peroxisomes. In addition, p-coumaric acid (CA), one of the main components from PLP, significantly inhibited fat accumulation in oleic acid-induced HepG2 cells. CA also significantly upregulated CPT-1 mRNA and protein expressions in HepG2 cells. We, firstly, found that PLP enhanced liver fat metabolism by upregulating CPT-1 expression in the mitochondria and might be promising in treatment of fatty liver diseases as alternative natural products. CA may be one of the active components of PLP
    corecore