67 research outputs found
Voter model on a directed network: Role of bidirectional opinion exchanges
The voter model with the node update rule is numerically investigated on a
directed network. We start from a directed hierarchical tree, and split and
rewire each incoming arc at the probability . In order to discriminate the
better and worse opinions, we break the symmetry () by
giving a little more preference to the opinion . It is found that
as becomes larger, introducing more complicated pattern of information flow
channels, and as the network size becomes larger, the system eventually
evolves to the state in which more voters agree on the better opinion, even
though the voter at the top of the hierarchy keeps the worse opinion. We also
find that the pure hierarchical tree makes opinion agreement very fast, while
the final absorbing state can easily be influenced by voters at the higher
ranks. On the other hand, although the ordering occurs much slower, the
existence of complicated pattern of bidirectional information flow allows the
system to agree on the better opinion.Comment: 5 pages, 3 figures, Phys. Rev. E (in press
Double resonance in the infinite-range quantum Ising model
We study quantum resonance behavior of the infinite-range kinetic Ising model
at zero temperature. Numerical integration of the time-dependent Schr\"odinger
equation in the presence of an external magnetic field in the direction is
performed at various transverse field strengths . It is revealed that two
resonance peaks occur when the energy gap matches the external driving
frequency at two distinct values of , one below and the other above the
quantum phase transition. From the similar observations already made in
classical systems with phase transitions, we propose that the double resonance
peaks should be a generic feature of continuous transitions, for both quantum
and classical many-body systems.Comment: 4 pages, 5 figure
Reentrant phase transition in a predator-prey model
We numerically investigate the six-species predator-prey game in complex
networks as well as in -dimensional hypercubic lattices with .
The interaction topology of the six species contains two loops, each of which
is composed of cyclically predating three species. As the mutation rate is
lowered below the well-defined phase transition point, the symmetry
related with the interchange of the two loops is spontaneously broken, and it
has been known that the system develops the defensive alliance in which three
cyclically predating species defend each other against the invasion of other
species. In the small-world network structure characterized by the rewiring
probability , the phase diagram shows the reentrant behavior as
is varied, indicating a twofold role of the shortcuts. In
-dimensional regular hypercubic lattices, the system also exhibits the
reentrant phase transition as is increased. We identify universality class
of the phase transition and discuss the proper mean-field limit of the system.Comment: 8 pages, 7 figures, Phys. Rev. E (in press
Comparative Interactomes of VRK1 and VRK3 with Their Distinct Roles in the Cell Cycle of Liver Cancer
Vaccinia-related kinase 1 (VRK1) and VRK3 are members of the VRK family of serine/threonine kinases and are principally localized in the nucleus. Despite the crucial roles of VRK1/VRK3 in physiology and disease, the molecular and functional interactions of VRK1/VRK3 are poorly understood. Here, we identified over 200 unreported VRK1/VRK3-interacting candidate proteins by affinity purification and LC-MS/MS. The networks of VRK1 and VRK3 interactomes were found to be associated with important biological processes such as the cell cycle, DNA repair, chromatin assembly, and RNA processing. Interactions of interacting proteins with VRK1/VRK3 were confirmed by biochemical assays. We also found that phosphorylations of XRCC5 were regulated by both VRK1/VRK3, and that of CCNB1 was regulated by VRK3. In liver cancer cells and tissues, VRK1/VRK3 were highly upregulated and its depletion affected cell cycle progression in the different phases. VRK3 seemed to affect S phase progression and G2 or M phase entry and exit, whereas VRK1 affects G1/S transition in the liver cancer, which could be explained by different interacting candidate proteins. Thus, this study not only provides a resource for investigating the unidentified functions of VRK1/VRK3, but also an insight into the regulatory roles of VRK1/VRK3 in biological processes.11Ysciescopuskc
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and MDS matrices. Thus, the security of bit permutation-based ciphers is significantly affected by differential and linear branch numbers (DBN and LBN) of nonlinear functions. In this paper, we introduce a widely applicable method for constructing S-boxes with high DBN and LBN. Our method exploits constructions of S-boxes from smaller S-boxes and it derives/proves the required conditions for smaller S-boxes so that the DBN and LBN of the constructed S-boxes are at least 3. These conditions enable us to significantly reduce the search space required to create such S-boxes. In order to make cryptographically good and efficient S-boxes, we propose a unbalanced-Bridge structure that accepts one 3-bit and two 5-bit S-boxes, and produces 8-bit S-boxes. Using the proposed structure, we develop a variety of new lightweight S-boxes that provide not only both DBN and LBN of at least 3 but also efficient bitsliced implementations including at most 11 nonlinear bitwise operations. The new S-boxes are the first that exhibit these characteristics. Moreover, we propose a block cipher PIPO based on one of the new S-boxes, which supports a 64-bit plaintext and a 128 or 256-bit key. Our implementations demonstrate that PIPO outperforms existing block ciphers (for the same block and key lengths) in both side-channel protected and unprotected environments, on an 8-bit AVR. The security of PIPO has been scrutinized with regards to state-of-the-art cryptanalysis
Numerical Study on Rayleigh-Taylor Instability Using a Multiphase Moving Particle Simulation Method
ํ๋์ ์์คํ
๋ด์ 2๊ฐ ์ด์์ ์์ด ๋ค๋ฅธ ์ ์ฒด๊ฐ ์กด์ฌํ ์์๋ ๋ค์์ ๋์ ์ํ ๋ณต์ฅ์ฑ์ด ์กด์ฌํ๋ฉฐ, ์ด๋ ํด์์ ์ด๋ ค์์ด ๋ฐ๋ฅธ๋ค. ๋ ๊ฐ ์ด์์ ์์ด ๋ค๋ฅธ ๋ค์์ ๋์ ์ ๋ ๋ฐ ๊ฒฝ๊ณ๋ฉด์ ์ํฅ์ ๋ผ์น์ง ๋๋ฌธ์, ๋ถ์์ ์ฑ๊ณผ ๊ฐ์ ๋น์ ํ์ ๋์ด ๋ํ๋๊ฒ ๋๋ค. ์ฌ๋ฌ ์ข
๋ฅ์ ๋ถ์์ ์ฑ ์ค ๋ ์ผ๋ฆฌํ-ํ
์ผ๋ฌ ๋ถ์์ ์ฑ์ ๋ํ์ ์ธ ์๋ก ์๋ ค์ ธ ์๋ค. ๋ณธ ์ฐ๊ตฌ์์๋ ๋ฐ๋์ฐจ๊ฐ ๋ ์ผ๋ฆฌํ-ํ
์ผ๋ฌ ๋ถ์์ ์ฑ์ ๋ฏธ์น๋ ์ํฅ์ ์กฐ์ฌํ๊ธฐ ์ํด ๋ค์ํ Atwood ์๋ฅผ ์ ์ ํ์์ผ๋ฉฐ, ์ด๊ธฐ ๊ฒฝ๊ณ๋ฉด ํ์ ์ญ์๋ค์ํ ํํ๋ฅผ ์ค์ ํ๊ณ ์๋ฎฌ๋ ์ด์
ํ์๋ค. ๋ณธ ์ฐ๊ตฌ์์ ์ฌ์ฉ๋ ์
์๋ฒ์ธ MPS(Moving particle simulation)์ ์ด๋ฌํ๋ค์์ ๋์์ ๋๋ฆฌ ์ฐ์ด์ง๋ ์์์ผ๋, ๋ค์์ ๋์ ์ํ ์
์๊ฐ ์ํธ ์ฐ์ฑ ๋ชจ๋ธ์ธ ์๊ฐ-๋ถ๋ ฅ ํญ, ํ๋ฉด ์ฅ๋ ฅ ํญ๊ณผ ๊ฒฝ๊ณ๋ฉด ๊ฒฝ๊ณ ์กฐ๊ฑด ํญ์ ์ถ๊ฐ๋ก ์ฌ์ฉํ์ฌ ์์นํด์์ด ๊ฐ๋ฅํ๊ฒ ํ์๋ค. ๋ณธ ์ฐ๊ตฌ์์ ์๋ก์ด ๊ฐ๋ฐ๋ ๋ค์์ ๋ํ ์
์๋ฒ์ ์ด์ฉํ์ฌ ๊ณ ๋ ค๋ ๊ฒฝ์ฐ๋ค์ ๋ํด ์์นํด์์ ์ํํ์์ผ๋ฉฐ, ๊ฐ๊ฐ์ ๊ฒฐ๊ณผ๋ค์ ๋น๊ต ๋ถ์ํ์๋ค. ๋ํ ๋ ์ผ๋ฆฌํ-ํ
์ผ๋ฌ ๋ถ์์ ์ฑ์ ๊ธฐ์ธํ ์ ๋์ ์๋๋ฅผ ์ธก์ ํ์ฌ ํฌํ
์
๊ธฐ๋ฐ์ ์ด๋ก ๊ฐ๊ณผ์ ๋น๊ต๋ฅผ ํตํด ๊ฒฝํฅ์ฑ์ด ์ผ์นํจ์ ์ ์ ์์๋ค. ์ด๋ก ๊ฐ๊ณผ์ ํฌ๊ธฐ์ ์ฐจ๋ ํฌํ
์
๊ธฐ๋ฐ์ ์ด๋ก ๊ฐ์์๋ ๊ณ ๋ ค๊ฐ ํ๋ ๋น์ ํ์ฑ์ ๊ธฐ์ธํ๋ค๊ณ ์ฌ๋ฃ๋๋ค.22Nkc
- โฆ