67 research outputs found

    Voter model on a directed network: Role of bidirectional opinion exchanges

    Full text link
    The voter model with the node update rule is numerically investigated on a directed network. We start from a directed hierarchical tree, and split and rewire each incoming arc at the probability pp. In order to discriminate the better and worse opinions, we break the Z2Z_2 symmetry (ฯƒ=ยฑ1\sigma = \pm 1) by giving a little more preference to the opinion ฯƒ=1\sigma = 1. It is found that as pp becomes larger, introducing more complicated pattern of information flow channels, and as the network size NN becomes larger, the system eventually evolves to the state in which more voters agree on the better opinion, even though the voter at the top of the hierarchy keeps the worse opinion. We also find that the pure hierarchical tree makes opinion agreement very fast, while the final absorbing state can easily be influenced by voters at the higher ranks. On the other hand, although the ordering occurs much slower, the existence of complicated pattern of bidirectional information flow allows the system to agree on the better opinion.Comment: 5 pages, 3 figures, Phys. Rev. E (in press

    Double resonance in the infinite-range quantum Ising model

    Full text link
    We study quantum resonance behavior of the infinite-range kinetic Ising model at zero temperature. Numerical integration of the time-dependent Schr\"odinger equation in the presence of an external magnetic field in the zz direction is performed at various transverse field strengths gg. It is revealed that two resonance peaks occur when the energy gap matches the external driving frequency at two distinct values of gg, one below and the other above the quantum phase transition. From the similar observations already made in classical systems with phase transitions, we propose that the double resonance peaks should be a generic feature of continuous transitions, for both quantum and classical many-body systems.Comment: 4 pages, 5 figure

    Reentrant phase transition in a predator-prey model

    Full text link
    We numerically investigate the six-species predator-prey game in complex networks as well as in dd-dimensional hypercubic lattices with d=1,2,...,6d=1,2,..., 6. The interaction topology of the six species contains two loops, each of which is composed of cyclically predating three species. As the mutation rate PP is lowered below the well-defined phase transition point, the Z2Z_2 symmetry related with the interchange of the two loops is spontaneously broken, and it has been known that the system develops the defensive alliance in which three cyclically predating species defend each other against the invasion of other species. In the small-world network structure characterized by the rewiring probability ฮฑ\alpha, the phase diagram shows the reentrant behavior as ฮฑ\alpha is varied, indicating a twofold role of the shortcuts. In dd-dimensional regular hypercubic lattices, the system also exhibits the reentrant phase transition as dd is increased. We identify universality class of the phase transition and discuss the proper mean-field limit of the system.Comment: 8 pages, 7 figures, Phys. Rev. E (in press

    Comparative Interactomes of VRK1 and VRK3 with Their Distinct Roles in the Cell Cycle of Liver Cancer

    Get PDF
    Vaccinia-related kinase 1 (VRK1) and VRK3 are members of the VRK family of serine/threonine kinases and are principally localized in the nucleus. Despite the crucial roles of VRK1/VRK3 in physiology and disease, the molecular and functional interactions of VRK1/VRK3 are poorly understood. Here, we identified over 200 unreported VRK1/VRK3-interacting candidate proteins by affinity purification and LC-MS/MS. The networks of VRK1 and VRK3 interactomes were found to be associated with important biological processes such as the cell cycle, DNA repair, chromatin assembly, and RNA processing. Interactions of interacting proteins with VRK1/VRK3 were confirmed by biochemical assays. We also found that phosphorylations of XRCC5 were regulated by both VRK1/VRK3, and that of CCNB1 was regulated by VRK3. In liver cancer cells and tissues, VRK1/VRK3 were highly upregulated and its depletion affected cell cycle progression in the different phases. VRK3 seemed to affect S phase progression and G2 or M phase entry and exit, whereas VRK1 affects G1/S transition in the liver cancer, which could be explained by different interacting candidate proteins. Thus, this study not only provides a resource for investigating the unidentified functions of VRK1/VRK3, but also an insight into the regulatory roles of VRK1/VRK3 in biological processes.11Ysciescopuskc

    A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application

    Get PDF
    Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and MDS matrices. Thus, the security of bit permutation-based ciphers is significantly affected by differential and linear branch numbers (DBN and LBN) of nonlinear functions. In this paper, we introduce a widely applicable method for constructing S-boxes with high DBN and LBN. Our method exploits constructions of S-boxes from smaller S-boxes and it derives/proves the required conditions for smaller S-boxes so that the DBN and LBN of the constructed S-boxes are at least 3. These conditions enable us to significantly reduce the search space required to create such S-boxes. In order to make cryptographically good and efficient S-boxes, we propose a unbalanced-Bridge structure that accepts one 3-bit and two 5-bit S-boxes, and produces 8-bit S-boxes. Using the proposed structure, we develop a variety of new lightweight S-boxes that provide not only both DBN and LBN of at least 3 but also efficient bitsliced implementations including at most 11 nonlinear bitwise operations. The new S-boxes are the first that exhibit these characteristics. Moreover, we propose a block cipher PIPO based on one of the new S-boxes, which supports a 64-bit plaintext and a 128 or 256-bit key. Our implementations demonstrate that PIPO outperforms existing block ciphers (for the same block and key lengths) in both side-channel protected and unprotected environments, on an 8-bit AVR. The security of PIPO has been scrutinized with regards to state-of-the-art cryptanalysis

    Numerical Study on Rayleigh-Taylor Instability Using a Multiphase Moving Particle Simulation Method

    No full text
    ํ•˜๋‚˜์˜ ์‹œ์Šคํ…œ ๋‚ด์— 2๊ฐœ ์ด์ƒ์˜ ์ƒ์ด ๋‹ค๋ฅธ ์œ ์ฒด๊ฐ€ ์กด์žฌํ•  ์‹œ์—๋Š” ๋‹ค์ƒ์œ ๋™์— ์˜ํ•œ ๋ณต์žฅ์„ฑ์ด ์กด์žฌํ•˜๋ฉฐ, ์ด๋Š” ํ•ด์„์˜ ์–ด๋ ค์›€์ด ๋”ฐ๋ฅธ๋‹ค. ๋‘ ๊ฐœ ์ด์ƒ์˜ ์ƒ์ด ๋‹ค๋ฅธ ๋‹ค์ƒ์œ ๋™์€ ์œ ๋™ ๋ฐ ๊ฒฝ๊ณ„๋ฉด์— ์˜ํ–ฅ์„ ๋ผ์น˜์ง€ ๋•Œ๋ฌธ์—, ๋ถˆ์•ˆ์ •์„ฑ๊ณผ ๊ฐ™์€ ๋น„์„ ํ˜•์œ ๋™์ด ๋‚˜ํƒ€๋‚˜๊ฒŒ ๋œ๋‹ค. ์—ฌ๋Ÿฌ ์ข…๋ฅ˜์˜ ๋ถˆ์•ˆ์ •์„ฑ ์ค‘ ๋ ˆ์ผ๋ฆฌํžˆ-ํ…Œ์ผ๋Ÿฌ ๋ถˆ์•ˆ์ •์„ฑ์€ ๋Œ€ํ‘œ์ ์ธ ์˜ˆ๋กœ ์•Œ๋ ค์ ธ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ฐ€๋„์ฐจ๊ฐ€ ๋ ˆ์ผ๋ฆฌํžˆ-ํ…Œ์ผ๋Ÿฌ ๋ถˆ์•ˆ์ •์„ฑ์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์„ ์กฐ์‚ฌํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ Atwood ์ˆ˜๋ฅผ ์„ ์ •ํ•˜์˜€์œผ๋ฉฐ, ์ดˆ๊ธฐ ๊ฒฝ๊ณ„๋ฉด ํ˜•์ƒ ์—ญ์‹œ๋‹ค์–‘ํ•œ ํ˜•ํƒœ๋ฅผ ์„ค์ •ํ•˜๊ณ  ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ ์‚ฌ์šฉ๋œ ์ž…์ž๋ฒ•์ธ MPS(Moving particle simulation)์€ ์ด๋Ÿฌํ•œ๋‹ค์ƒ์œ ๋™์—์„œ ๋„๋ฆฌ ์“ฐ์ด์ง€๋Š” ์•Š์•˜์œผ๋‚˜, ๋‹ค์ƒ์œ ๋™์„ ์œ„ํ•œ ์ž…์ž๊ฐ„ ์ƒํ˜ธ ์—ฐ์„ฑ ๋ชจ๋ธ์ธ ์ž๊ฐ€-๋ถ€๋ ฅ ํ•ญ, ํ‘œ๋ฉด ์žฅ๋ ฅ ํ•ญ๊ณผ ๊ฒฝ๊ณ„๋ฉด ๊ฒฝ๊ณ„ ์กฐ๊ฑด ํ•ญ์„ ์ถ”๊ฐ€๋กœ ์‚ฌ์šฉํ•˜์—ฌ ์ˆ˜์น˜ํ•ด์„์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ƒˆ๋กœ์ด ๊ฐœ๋ฐœ๋œ ๋‹ค์ƒ์œ ๋™ํ˜• ์ž…์ž๋ฒ•์„ ์ด์šฉํ•˜์—ฌ ๊ณ ๋ ค๋œ ๊ฒฝ์šฐ๋“ค์— ๋Œ€ํ•ด ์ˆ˜์น˜ํ•ด์„์„ ์ˆ˜ํ–‰ํ•˜์˜€์œผ๋ฉฐ, ๊ฐ๊ฐ์˜ ๊ฒฐ๊ณผ๋“ค์„ ๋น„๊ต ๋ถ„์„ํ•˜์˜€๋‹ค. ๋˜ํ•œ ๋ ˆ์ผ๋ฆฌํžˆ-ํ…Œ์ผ๋Ÿฌ ๋ถˆ์•ˆ์ •์„ฑ์— ๊ธฐ์ธํ•œ ์œ ๋™์˜ ์†๋„๋ฅผ ์ธก์ •ํ•˜์—ฌ ํฌํ…์…œ ๊ธฐ๋ฐ˜์˜ ์ด๋ก ๊ฐ’๊ณผ์˜ ๋น„๊ต๋ฅผ ํ†ตํ•ด ๊ฒฝํ–ฅ์„ฑ์ด ์ผ์น˜ํ•จ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด๋ก ๊ฐ’๊ณผ์˜ ํฌ๊ธฐ์˜ ์ฐจ๋Š” ํฌํ…์…œ ๊ธฐ๋ฐ˜์˜ ์ด๋ก ๊ฐ’์—์„œ๋Š” ๊ณ ๋ ค๊ฐ€ ํž˜๋“  ๋น„์„ ํ˜•์„ฑ์— ๊ธฐ์ธํ•œ๋‹ค๊ณ  ์‚ฌ๋ฃŒ๋œ๋‹ค.22Nkc
    • โ€ฆ
    corecore