• Title/Summary/Keyword: Boolean

Search Result 513, Processing Time 0.022 seconds

Concept and Attribute based Answer Retrieval (개념 속성 기반 정보 검색)

  • Yun Bo-Hyun;Seo Chang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.1-10
    • /
    • 2005
  • This paper presents the information retrieval system which can retrieve the most appropriate answer sentence for user queries by using the concept and the attribute for the knowledge retrieval. The system analyzes the user query into the Boolean queries with the concept and the attribute and then retrieve the relevant documents in the indexing set of answer documents. Users can retrieve the relevant answer sentences from the relevant documents. For this, the answer documents indexed by the concept and the attribute are segmented by each sentence respectively. Thus, the segmented sentences are analyzed into the concept and the attribute of which the relevance degree with indexing units of documents is evaluated. Then, the system indexes the location of answer sentences. In the experiment, we evaluate the performance of our answer retrieval system against 100 user queries and show the experimental results.

  • PDF

A Signature Method for Efficient Preprocessing of XML Queries (XML 질의의 효율적인 전처리를 위한 시그너처 방법)

  • 정연돈;김종욱;김명호
    • Journal of KIISE:Databases
    • /
    • v.30 no.5
    • /
    • pp.532-539
    • /
    • 2003
  • The paper proposes a pre-processing method for efficient processing of XML queries in information retrieval systems with a large amount of XML documents. For the pre-processing, we use a signature-based approach. In the conventional (flat document-based) information retrieval systems, user queries consist of keywords and boolean operators, and thus signatures are structured in a flat manner. However, in XML-based information retrieval systems, the user queries have the form of path query. Therefore, the flat signature cannot be effective for XML documents. In the paper, we propose a structured signature for XML documents. Through experiments, we evaluate the performance of the proposed method.

Masking-Based Block Cipher LEA Resistant to Side Channel Attacks (부채널 공격에 대응하는 마스킹 기반의 블록 암호 LEA)

  • Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1023-1032
    • /
    • 2017
  • When a cryptographic device such as smart card performs an encryption for a plain text, an attacker can extract the secret key in it using side channel information. Especially, many researches found some weaknesses for side channel attack on the lightweight block cipher LEA designed to apply in IoT environments. In this paper, we survey several masking countermeasures to defeat the side channel attack and propose a novel masking conversion method. Even though the proposed Arithmetic-to-Boolean masking conversion method requires storage memory of 256 bytes, it can improve the LEA encryption speed up to 17 percentage compared to the case adopted the previous masking method.

Optimal Synthesis Method for Binary Neural Network using NETLA (NETLA를 이용한 이진 신경회로망의 최적 합성방법)

  • Sung, Sang-Kyu;Kim, Tae-Woo;Park, Doo-Hwan;Jo, Hyun-Woo;Ha, Hong-Gon;Lee, Joon-Tark
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2726-2728
    • /
    • 2001
  • This paper describes an optimal synthesis method of binary neural network(BNN) for an approximation problem of a circular region using a newly proposed learning algorithm[7] Our object is to minimize the number of connections and neurons in hidden layer by using a Newly Expanded and Truncated Learning Algorithm(NETLA) for the multilayer BNN. The synthesis method in the NETLA is based on the extension principle of Expanded and Truncated Learning(ETL) and is based on Expanded Sum of Product (ESP) as one of the boolean expression techniques. And it has an ability to optimize the given BNN in the binary space without any iterative training as the conventional Error Back Propagation(EBP) algorithm[6] If all the true and false patterns are only given, the connection weights and the threshold values can be immediately determined by an optimal synthesis method of the NETLA without any tedious learning. Futhermore, the number of the required neurons in hidden layer can be reduced and the fast learning of BNN can be realized. The superiority of this NETLA to other algorithms was proved by the approximation problem of one circular region.

  • PDF

Consideration of a Robust Search Methodology that could be used in Full-Text Information Retrieval Systems (퍼지 논리를 이용한 사용자 중심적인 Full-Text 검색방법에 관한 연구)

  • Lee, Won-Bu
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.87-101
    • /
    • 1991
  • The primary purpose of this study was to investigate a robust search methodology that could be used in full-text information retrieval systems. A robust search methodology is one that can be easily used by a variety of users (particularly naive users) and it will give them comparable search performance regardless of their different expertise or interests In order to develop a possibly robust search methodology, a fully functional prototype of a fuzzy knowledge based information retrieval system was developed. Also, an experiment that used this prototype information retreival system was designed to investigate the performance of that search methodology over a small exploratory sample of user queries To probe the relatonships between the possibly robust search performance and the query organization using fuzzy inference logic, the search performance of a shallow query structure was analyzes. Consequently the following several noteworthy findings were obtained: 1) the hierachical(tree type) query structure might be a better query organization than the linear type query structure 2) comparing with the complex tree query structure, the simple tree query structure that has at most three levels of query might provide better search performance 3) the fuzzy search methodology that employs a proper levels of cut-off value might provide more efficient search performance than the boolean search methodology. Even though findings could not be statistically verified because the experiments were done using a single replication, it is worth noting however, that the research findings provided valuable information for developing a possibly robust search methodology in full-text information retrieval.

  • PDF

The design of digital circuit for chaotic composition map (혼돈합성맵의 디지털회로설계)

  • Park, Kwang-Hyeon;Seo, Yong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.652-657
    • /
    • 2013
  • In this paper the design methode of a separated composition state machine based on the compositive map with two chaotic maps together and the result of that is proposed. The digital circuits of chaotic composition map for the use of chaotic binary stream generator are designed in this work. The discretized truth table of chaotic composition function which is composed of two chaotic functions - the saw tooth function and skewed logistic function - is made out, and also simplefied Boolean algebras of digital circuits are obtained as a mathematical model. Consequently, the digital circuits of the map for chaotic composition function are presented in this paper.

RINGS IN WHICH SUMS OF d-IDEALS ARE d-IDEALS

  • Dube, Themba
    • Journal of the Korean Mathematical Society
    • /
    • v.56 no.2
    • /
    • pp.539-558
    • /
    • 2019
  • An ideal of a commutative ring is called a d-ideal if it contains the annihilator of the annihilator of each of its elements. Denote by DId(A) the lattice of d-ideals of a ring A. We prove that, as in the case of f-rings, DId(A) is an algebraic frame. Call a ring homomorphism "compatible" if it maps equally annihilated elements in its domain to equally annihilated elements in the codomain. Denote by $SdRng_c$ the category whose objects are rings in which the sum of two d-ideals is a d-ideal, and whose morphisms are compatible ring homomorphisms. We show that $DId:\;SdRng_c{\rightarrow}CohFrm$ is a functor (CohFrm is the category of coherent frames with coherent maps), and we construct a natural transformation $RId{\rightarrow}DId$, in a most natural way, where RId is the functor that sends a ring to its frame of radical ideals. We prove that a ring A is a Baer ring if and only if it belongs to the category $SdRng_c$ and DId(A) is isomorphic to the frame of ideals of the Boolean algebra of idempotents of A. We end by showing that the category $SdRng_c$ has finite products.

Rate of Waste in Authority Names for the Web of Science Journals among Saudi Universities

  • Otaibi, Abdullah Al;Sawy, Yaser Mohammad Al
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.267-272
    • /
    • 2021
  • The current study aimed at measuring the rate of loss in search results of the actual number of publications in journals indexed by Web of Science when not using the accurate official authority name as indicated by the Ministry of Education. Conducting a search using the authority name does not always yield complete results of all existing publications. Researchers in Saudi universities tend to use up to 10 different random names of universities when searching. This interesting fact has prompted the authors of this paper to conduct a study on the search results of 30 Saudi universities using the authority name as indicated by the Ministry of Education. The statistical analyses revealed that there is a high tendency for the wrong use of authority names. Results show that 8 universities were not found in the search results. Furthermore, other universities are losing between 10 and 30% of search results that reflect the actual number of publications. Consequently, the rank of each university, as well as the general rank of Saudi universities in the Web of Science, will be affected.

Analysis of hash functions based on cellular automata (셀룰러 오토마타 기반 해쉬 함수 분석)

  • Jeong Kitae;Lee Jesang;Chang Donghoon;Sung Jaechul;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.111-123
    • /
    • 2004
  • A hash function is a function that takes bit strings of arbitrary length to bit string of fixed length. A cellular automata is a finite state machine and has the property of generating pseudorandom numbers efficiently by combinational logics of neighbour cells. In [1] and [7], hash functions based on cellular automata which can be implemented efficiently in hardware were proposed. In this paper, we show that we can find collisions of these hash functions with probability 0.46875 and 0.5 respectively.

Integral Attacks on Some Lightweight Block Ciphers

  • Zhu, Shiqiang;Wang, Gaoli;He, Yu;Qian, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4502-4521
    • /
    • 2020
  • At EUROCRYPT 2015, Todo proposed a new technique named division property, and it is a powerful technique to find integral distinguishers. The original division property is also named word-based division property. Later, Todo and Morii once again proposed a new technique named the bit-based division property at FSE 2016 and find more rounds integral distinguisher for SIMON-32. There are two basic approaches currently being adopted in researches under the bit-based division property. One is conventional bit-based division property (CBDP), the other is bit-based division property using three-subset (BDPT). Particularly, BDPT is more powerful than CBDP. In this paper, we use Boolean Satisfiability Problem (SAT)-aided cryptanalysis to search integral distinguishers. We conduct experiments on SIMON-32/-48/-64/-96, SIMON (102)-32/-48/-64, SIMECK-32/-48/-64, LBlock, GIFT and Khudra to prove the efficiency of our method. For SIMON (102)-32/-48/-64, we can determine some bits are odd, while these bits can only be determined as constant in the previous result. For GIFT, more balanced (zero-sum) bits can be found. For LBlock, we can find some other new integral distinguishers. For Khudra, we obtain two 9-round integral distinguishers. For other ciphers, we can find the same integral distinguishers as before.