• Title/Summary/Keyword: Algebraic contents

Search Result 31, Processing Time 0.029 seconds

DEVELOPMENT OF IONOSPHERIC TOMOGRAPHY MODEL USING GPS (GPS를 이용한 전리층 토모그래피 모델 개발)

  • Choi Byung-Kyu;Park Jong-Uk;Lee Sang-Jeong
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.3
    • /
    • pp.237-244
    • /
    • 2006
  • We produced the electron density distribution in the ionosphere over South Korea using the data from nine permanent GPS (Global Positioning System) stations which have been operated by KASI (Korea Astronomy and Space Science Institute). The dual-frequency GPS receiver data was used to precisely estimate the electron density in the ionosphere and we obtained the precise electron density profile based on two-dimensional TEC (Total Electron Contents). We applied ART (Algebraic Reconstruction Technique), which is one of the most commonly used algorithms to develop the tomography model. This paper presented the electron density distribution over South Korea with time. We compared with the electron density profiles derived from the GPS tomography reconstruction, Ionosonde measurement data obtained by observations, and the IRI-2001 values. As a result, the electron density profile by GPS reconstruction was in excellent agreement with the electron density profile obtained by Ionosonde measurement data.

Logic of Quantum Mechanics for Information Technology Field

  • Yon, Yong-Ho
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.56-63
    • /
    • 2011
  • Quantum mechanics is a branch of physics for a mathematical description of the particle wave, and it is applied to information technology such as quantum computer, quantum information, quantum network and quantum cryptography, etc. In 1936, Garrett Birkhoff and John von Neumann introduced the logic of quantum mechanics (quantum logic) in order to investigate projections on a Hilbert space. As another type of quantum logic, orthomodular implication algebra was introduced by Chajda et al. This algebra has the logical implication as a binary operation. In pure mathematics, there are many algebras such as Hilbert algebras, implicative models, implication algebras and dual BCK-algebras (DBCK-algebras), which have the logical implication as a binary operation. In this paper, we introduce the definitions and some properties of those algebras and clarify the relations between those algebras. Also, we define the implicative poset which is a generalization of orthomodular implication algebras and DBCK-algebras, and research properties of this algebraic structure.

Ceyuan (測圓海鏡) and Jiuyong Yandai (九容演代)

  • Cheng, Chun Chor Litwin
    • Journal for History of Mathematics
    • /
    • v.27 no.1
    • /
    • pp.13-30
    • /
    • 2014
  • The book ${\ll}$Ceyuan Haijing${\gg}$ studies inscribed and circumscribed circles in a right triangle and shows equations that give the diameters of the circles. We discuss the development of mathematical contents written by the scholar Yang Zhaoyun in Qing dynasty on the contents of ${\ll}$Ceyuan Haijing${\gg}$ in his book ${\ll}$Jiuyong Yandai${\gg}$. He derived equations to find the diameters of the circles based on algebraic knowledge known in the Qing dynasty. In this paper, we conclude that Yang's methods in devising the equations include the Gou-Gu Theorem, mathematical expressions derived from Gou-Gu ratio table, and the technique of interchanging triangles and events. We conclude that the Gou-Gu ratio table was a very important tool when Yang devised the equations in ${\ll}$Ceyuan Haijing${\gg}$.

Wireless PKI for Reducing Certificate Acquisition Time According to Authentication Path

  • Choi Seung-Kwon;Cho Yong-Hwan;Shin Seung-Soo;Jang Yoon-Sik
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • In this paper, we proposed an advanced authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. We simulated and compared the authentication structure proposed by Sufatrio, K. Lam[4] and proposed authentication structure in terms of the authentication time. Simulation results show that the proposed method reduces the authentication time compared to the conventional wireless PKI authentication method.

  • PDF

Blocking Probability for Wireless PKI (무선 PKI에서의 블러킹 확률)

  • Shin, Seung-Soo;Choi, Seung Kwon;Cho, Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.220-227
    • /
    • 2004
  • In this paper, we made out blocking probability analysis for a new authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Besides, we proposed advanced handover method and blocking probability analysis for wireless PKI.

  • PDF

Comparative Study in Algebra Education with CAS: Korea and US cases (컴퓨터 대수체계(CAS) 대비 중등대수교육 기초 연구)

  • Chang, Kyung-Yoon
    • School Mathematics
    • /
    • v.10 no.2
    • /
    • pp.297-317
    • /
    • 2008
  • This study was designed to gain insight to adopt CAS into secondary level algebra education in Korea. Most inactive usage of calculators in math and most negative effects of calculators on their achievements of Korean students were shown in International studies such as TIMSS-R. A comparative study was carried out with consideration of mathematical backgrounds and technological environments. 8 Korean students and 26 US students in Grade 11 were participated in this study. Subjects' Problem solving process and their strategies of CAS usage in classical Box-problem with CAS were analyzed. CAS helped modeling by providing symbolic manipulation commands and graphs with students' mathematical knowledge. Results indicates that CAS requires shifts focus in algebraic contents: recognition of decimal & algebraic presentations of numbers; linking various presentations, etc. The extent of instrumentation effects on the selection of problem solving strategies among Korea and US students. Instrumentation

  • PDF

Examining Pre- and In-service Mathematics Teachers' Proficiencies in Reasoning and Proof-Production (수학 교사와 예비교사의 추론 및 증명구성 역량 및 특성 탐색)

  • Yoo, EunSoo;Kim, Gooyeon
    • The Mathematical Education
    • /
    • v.58 no.2
    • /
    • pp.161-185
    • /
    • 2019
  • This study aims to examine pre- and in-service mathematics teachers' reasoning and how they justify their reasoning. For this purpose, we developed a set of mathematical tasks that are based on mathematical contents for middle grade students and conducted the survey to pre- and in-service teachers in Korea. Twenty-five pre-service teachers and 8 in-service teachers participated in the survey. The findings from the data analysis suggested as follows: a) the pre- and in-service mathematics teachers seemed to be very dependent of the manipulation of algebraic expressions so that they attempt to justify only by means of procedures such as known algorithms, rules, facts, etc., rather than trying to find out a mathematical structure in the first instance, b) the proof that teachers produced did not satisfy the generality when they attempted to justify using by other ways than the algebraic manipulation, c) the teachers appeared to rely on using formulas for finding patters and justifying their reasoning, d) a considerable number of the teachers seemed to stay at level 2 in terms of the proof production level, and e) more than 3/4 of the participating teachers appeared to have difficulty in mathematical reasoning and proof production particularly when faced completely new mathematical tasks.

On the data of Euclid (유클리드의 자료론(Euclid's Data)에 대하여)

  • Yoon, Dae-Won;Suh, Bo-Euk;Kim, Dong-Keun
    • Journal for History of Mathematics
    • /
    • v.21 no.2
    • /
    • pp.55-70
    • /
    • 2008
  • This study is about the Data which is one of Euclid's writing. It dealt with the organization of contents, formal system and mathematical meaning. First, we investigated the organization of contents of the Data. Second, on the basis of this investigation, we analyzed the formal system of the Data. It contains the analysis of described method of definition, proposition, proof and the meaning of 'given'. Third, we explored the mathematical meaning of the Data which can be classified as algebraic point of view, geometric point of view and the opposite point of view to 'The Elements'.

  • PDF

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

A Comparative Analysis on the Distributive Property In Korean and Japanese Elementary Textbooks (한국과 일본의 초등교과서에서 다루는 분배법칙 개념에 관한 비교 분석)

  • Byun, Hee-Hyun
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.15 no.1
    • /
    • pp.39-56
    • /
    • 2011
  • In 7th grade textbooks, the distributive property is generalized as in algebraic forms, and it seems that the students have not so good grip on this property. To get a good stock of knowledge on that generalized property, full understanding of it in concrete context should take precedence. This study would aim to propose some educational implications for better understanding of that property, through analysing the contents of it comparatively in Korean and Japanese elementary textbooks.

  • PDF