66 research outputs found

    Characteristics of transient pressure performance of horizontal wells in fractured-vuggy tight fractal reservoirs considering nonlinear seepage

    Get PDF
    International audienceSince the classical seepage theory has limitations in characterizing the heterogeneity of fractured-vuggy tight reservoirs, well test interpretation results are not consistent with actual production by far. Based on the nonlinear percolation theory, a new nonlinear seepage equation considering the boundary layer and yield stress was derived to describe the seepage characteristics of dense matrix blocks and the stress sensitivity and fractal features of fracture systems were characterized by applying the fractal theory. Thus, the nonlinear model of a horizontal well in a fractured-vuggy tight fractal reservoir was established naturally. Then the finite element method was applied to solve the bottom hole pressure based on the processing of internal boundary conditions. After solving the model, the seepage characteristics of different models were summarized by analyzing the bottom hole pressure dynamic curves and the sensitivity analysis of multiple parameters such the nonlinear parameter and fractal index were conducted. Finally, the practicality of the model was proved through a field application. The results show that the pressure dynamic curves can be divided into nine flow stages and the increase of the nonlinear parameter will cause the intensity of the cross flow from matrix blocks to the fracture system to decrease. The fractal index is irrelevant to the intensity of the cross flow while it decides the upwarping degree of the curve at the middle and late flow stages. On the basis of the results of the field application, it can be concluded that the model fits well with actual production and the application of this model can improve the accuracy of well test interpretation

    Improving Matsui\u27s Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT

    Get PDF
    Automatic search methods have been widely used for cryptanalysis of block ciphers, especially for the most classic cryptanalysis methods -- differential and linear cryptanalysis. However, the automatic search methods, no matter based on MILP, SMT/SAT or CP techniques, can be inefficient when the search space is too large. In this paper, we improve Matsui\u27s branch-and-bound search algorithm which is known as the first generic algorithm for finding the best differential and linear trails by proposing three new methods. The three methods, named Reconstructing DDT and LAT According to Weight, Executing Linear Layer Operations in Minimal Cost and Merging Two 4-bit S-boxes into One 8-bit S-box respectively, can efficiently speed up the search process by reducing the search space as much as possible and reducing the cost of executing linear layer operations. We apply our improved algorithm to DESL and GIFT, which are still the hard instances for the automatic search methods. As a result, we find the best differential trails for DESL (up to 14 rounds) and GIFT-128 (up to 19 rounds). The best linear trails for DESL (up to 16 rounds), GIFT-128 (up to 10 rounds) and GIFT-64 (up to 15 rounds) are also found. To the best of our knowledge, these security bounds for DESL and GIFT under single-key scenario are given for the first time. Meanwhile, it is the longest exploitable (differential or linear) trails for DESL and GIFT. Furthermore, benefiting from the efficiency of the improved algorithm, we do experiments to demonstrate that the clustering effect of differential trails for 13-round DES and DESL are both weak

    Spiritual Leadership on Proactive Workplace Behavior: The Role of Organizational Identification and Psychological Safety

    Get PDF
    This study investigates whether and why spiritual leadership may contribute to enhanced proactive employee workplace behavior. Based on self-determination theory (SDT), we examine the effects of two sequential mediators (i.e., organizational identification and psychological safety) on the relationship between spiritual leadership and proactive workplace behavior. Data collected from 188 subordinate-leader dyads in Chinese firms suggested that spiritual leadership has a significant positive effect on proactive workplace behavior. In addition, both organizational identification and psychological safety mediate the relationship between spiritual leadership and proactive workplace behavior. Furthermore, spiritual leadership positively influences organizational identification, and such identification nurtures psychological safety, which, in turn, fosters the proactive behavior of employees. It extends the existing impact of spiritual leadership to proactive workplace behavior and shed lights on the mediating mechanisms through which spiritual leadership exerts influences on proactive workplace behavior. Finally, it considers the important roles played by leaders in modern organizations

    Improved (Related-key) Differential Cryptanalysis on GIFT

    Get PDF
    In this paper, we reevaluate the security of GIFT against differential cryptanalysis under both single-key scenario and related-key scenario. Firstly, we apply Matsui\u27s algorithm to search related-key differential trails of GIFT. We add three constraints to limit the search space and search the optimal related-key differential trails on the limited search space. We obtain related-key differential trails of GIFT-64/128 for up to 15/14 rounds, which are the best results on related-key differential trails of GIFT so far. Secondly, we propose an automatic algorithm to increase the probability of the related-key boomerang distinguisher of GIFT by searching the clustering of the related-key differential trails utilized in the boomerang distinguisher. We find a 20-round related-key boomerang distinguisher of GIFT-64 with probability 2^-58.557. The 25-round related-key rectangle attack on GIFT-64 is constructed based on it. This is the longest attack on GIFT-64. We also find a 19-round related-key boomerang distinguisher of GIFT-128 with probability 2^-109.626. We propose a 23-round related-key rectangle attack on GIFT-128 utilizing the 19-round distinguisher, which is the longest related-key attack on GIFT-128. The 24-round related-key rectangle attack on GIFT-64 and 22-round related-key boomerang attack on GIFT-128 are also presented. Thirdly, we search the clustering of the single-key differential trails. We increase the probability of a 20-round single-key differential distinguisher of GIFT-128 from 2^-121.415 to 2^-120.245. The time complexity of the 26-round differential attack on GIFT-128 is improved from 2^124:415 to 2^123:245

    An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls

    Get PDF
    The design and cryptanalysis are the both sides from which we look at symmetric-key primitives. If a symmetric-key primitive is broken by a kind of cryptanalysis, it\u27s definitely insecure. If a designer claims a symmetric-key primitive to be secure, one should demonstrate that the primitive resists against all known attacks. Differential and linear cryptanalysis are two of the most important kinds of cryptanalysis. To conduct a successful differential (linear) cryptanalysis, a differential (linear) distinguisher with significant differential probability (linear correlation) is needed. We observe that, for some lightweight symmetric-key primitives, their significant trails usually contain iterative trails. In this work, We propose an automatic tool for searching iterative trails. We model the problem of searching itrative trails as a problem of finding elementry ciucuits in a graph. Based on the iterative trails found, we further propose a method to estimate the probability (correlation) of a differential (linear hull). We apply our methods to the 256-bit KNOT permutation, PRESENT, GIFT-64 and RECTANGLE. Iterative trails are found and visualized. If iterative trails are found, we show our method can efficiently find good differentials and linear hulls. What\u27s more, the results imply that for the primitives we test with bit permutations as their linear layers, the good differentials and linear hulls are dominated by iterative trails

    TVIR: a comprehensive vegetable information resource database for comparative and functional genomic studies

    Get PDF
    Vegetables are an indispensable part of the daily diet of humans. Therefore, it is vital to systematically study the genomic data of vegetables and build a platform for data sharing and analysis. In this study, a comprehensive platform for vegetables with a user-friendly Web interface—The Vegetable Information Resource (TVIR, http://tvir.bio2db.com)—was built based on the genomes of 59 vegetables. TVIR database contains numerous important functional genes, including 5215 auxin genes, 2437 anthocyanin genes, 15 002 flowering genes, 79 830 resistance genes, and 2639 glucosinolate genes of 59 vegetables. In addition, 2597 N6-methyladenosine (m6A) genes were identified, including 513 writers, 1058 erasers, and 1026 readers. A total of 2 101 501 specific clustered regularly interspaced short palindromic repeat (CRISPR) guide sequences and 17 377 miRNAs were detected and deposited in TVIR database. Information on gene synteny, duplication, and orthologs is also provided for 59 vegetable species. TVIR database contains 2 346 850 gene annotations by the Swiss-Prot, TrEMBL, Gene Ontology (GO), Pfam, and Non-redundant (Nr) databases. Synteny, Primer Design, Blast, and JBrowse tools are provided to facilitate users in conducting comparative genomic analyses. This is the first large-scale collection of vegetable genomic data and bioinformatic analysis. All genome and gene sequences, annotations, and bioinformatic results can be easily downloaded from TVIR. Furthermore, transcriptome data of 98 vegetables have been collected and collated, and can be searched by species, tissues, or different growth stages. TVIR is expected to become a key hub for vegetable research globally. The database will be updated with newly assembled vegetable genomes and comparative genomic studies in the future

    Cloning and characterization of two subunits of calcineurin cDNA in naked carp (Gymnocypris przewalskii) from Lake Qinghai, China

    Get PDF
    The naked carp (Gymnocypris przewalskii), a native teleost, plays an important role in maintenance of the ecological balance in the system of Lake Qinghai (altitude, 3.2 km) on the Qinghai-Tibet Plateau in China. Calcineurin (CN) is the only member of the serine/threonine phosphatase family that can be activated by both Ca2+ and calmodulin (CaM) and involved in many important physiological processes such as salt tolerance/adaption. In this report, cDNAs of CN catalytic subunit paralogue isoforms: GpCAα (GenBank accession no.JQ407043), GpCAγ (GenBank accession no. JQ407043), and CN regulatory subunit (GpCB) (GenBank accession no. JQ410473), were isolated from Gymnocypris przewalskii and their expression patterns in embryos developmentwere characterized. Gene expression profile demonstrated that GpCA and GpCB mRNA was distributed ubiquitously in all embryonic stages and showed decline until final stage of development. Immunohistologicalanalysis revealed CN localization in different tissues including kidney, heart, brain, spermary, and gill. Collectively, these results provide molecular basis and clues to further understand the role of CN during embryos development and its function in tissues for the adaptation mechanism of naked carp

    New advances in clinical application of neostigmine: no longer focusing solely on increasing skeletal muscle strength

    Get PDF
    Neostigmine is a clinical cholinesterase inhibitor, that is, commonly used to enhance the function of the cholinergic neuromuscular junction. Recent studies have shown that neostigmine regulates the immune-inflammatory response through the cholinergic anti-inflammatory pathway, affecting perioperative neurocognitive function. This article reviews the relevant research evidence over the past 20 years, intending to provide new perspectives and strategies for the clinical application of neostigmine
    • …
    corecore