![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessNovel MAXPOWER biological antibacterial liquid for eradicating oral Helicobacter pylori
Eradication of oral Helicobacter pylori (H. pylori) not only reduces the infection rate from the transmission route but also improves the success rate of intragastric eradication. MAXPOWER Biological Bacteriostat...
-
Chapter and Conference Paper
Effects of Visual-Vestibular Conflicts Caused by Visual Input on Out-of-Body Experience Induced by Visual-Tactile Stimulation in Virtual Reality
Out-of-body experience (OBE) is a feeling that people observe and feel his/her own body from somewhere outside the physical body. In this paper, we examined the effects of visual-vestibular conflict caused by ...
-
Chapter and Conference Paper
Graph Reinforcement Learning for Securing Critical Loads by E-Mobility
Inefficient scheduling of electric vehicles (EVs) is detrimental to not only the profitability of charging stations but also the experience of EV users and the stable operation of the grid. Regulating the char...
-
Chapter and Conference Paper
Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm
Simon’s algorithm has shown a threat to block ciphers in the quantum setting, especially accelerating attacks with superposition queries. Sometimes it is difficult for attackers to make superposition queries, ...
-
Article
Improved attacks against reduced-round Whirlwind
The Whirlwind hash function was proposed by Barreto et al. (Des Codes Cryptogr 56(2–3):141–162, 2010, https://doi.org/10.1007/s10623-010-9391-y). In this paper, we...
-
Article
Open AccessCase report: acute isolated cilioretinal artery occlusion secondary to percutaneous coronary intervention
This case report aims to describe in detail the acute isolated cilioretinal artery occlusion (CLRAO) secondary to complicated therapeutic percutaneous coronary intervention (PCI).
-
Article
Open AccessNrf2 regulates iron-dependent hippocampal synapses and functional connectivity damage in depression
Neuronal iron overload contributes to synaptic damage and neuropsychiatric disorders. However, the molecular mechanisms underlying iron deposition in depression remain largely unexplored. Our study aims to inv...
-
Article
A home energy management approach using decoupling value and policy in reinforcement learning
Considering the popularity of electric vehicles and the flexibility of household appliances, it is feasible to dispatch energy in home energy systems under dynamic electricity prices to optimize electricity co...
-
Article
Adsorption Characteristic of Methyl Blue onto Magnetic CaFe2O4 Nanoparticles Prepared via the Ethanol-Assisted Combustion Process
CaFe2O4 nanoparticles were prepared successfully and characterized by SEM, TEM, XRD and VSM. The effects of ethanol dosage, calcination temperature, heating rate and calcination time on CaFe2O4 nanoparticles were...
-
Chapter and Conference Paper
Identification of Morphing Aircraft Aerodynamic Parameters Based on Maximum Likelihood Method
In this paper, Maximum Likelihood Method is used to identify aerodynamic parameters of the variable sweep wing morphing aircraft. First, we give the longitudinal nonlinear dynamic model and aerodynamic model o...
-
Chapter and Conference Paper
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum herding attacks on iterative hash functions for the first time. Their attack needs exponential quantum random access memory (qRAM), more ...
-
Chapter and Conference Paper
Fully Distributed Multi-UAV Cooperative Hunting with External Disturbance
This paper focuses on multi-UAV cooperative hunting problem subject to unknown external disturbance in three-dimensional environment. A fully distributed extended state observer (ESO) based anti-disturbance co...
-
Chapter and Conference Paper
Automated Meet-in-the-Middle Attack Goes to Feistel
Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and the ISO standard Lesamnta-LW. The Meet-in-the-Middle (MitM) is a ...
-
Chapter and Conference Paper
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damgård (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We f...
-
Article
Open AccessA novel random finite element model for holistically modeling of the frost effects on soils and cold region pavements
This paper describes the development of a random finite element model (RFEM) that allows holistic simulation of frozen soil behaviors, including the effects of phase transition and the consequent internal stre...
-
Article
Heterostructured MoS2/GPC anode: the synergistic lithium storage performance and lithiation kinetics
Grapefruit peel carbon (GPC) is prepared from waste grapefruit peel and further used as substrate for in situ construction of MoS2 arrays, forming MoS2/GPC heterostructured materials. Based on the effect of the m...
-
Article
Transfer film growth of continuous carbon fiber reinforced thermoplastic poly(ether ether ketone) facilitated by surface texture during dry sliding
To show the effect of surface texture on transfer film growth of continuous carbon fiber-reinforced thermoplastic poly(ether ether ketone) (CCF-PEEK), tribological behaviors of untextured and laser-engraved-di...
-
Chapter and Conference Paper
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems
In this paper, we present preimage attacks on 4-round Keccak-224/256 as well as 4-round Keccak[ \(r = 640,c = 160,l = 80\) ...
-
Chapter and Conference Paper
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirem...
-
Chapter and Conference Paper
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quart...