• 제목/요약/키워드: CAESAR

검색결과 24건 처리시간 0.01초

CAESAR-II를 이용한 파이프 루프의 구조 거동 특성 연구 (Study on Structural Behavior of Pipe Loops Using CAESAR-II)

  • 박치모;윤성룡
    • 한국해양공학회지
    • /
    • 제27권2호
    • /
    • pp.13-18
    • /
    • 2013
  • Most ships and offshore structures are equipped with a variety of pipes, which inevitably contain curved portions. The structural design of these pipes mostly relies on the commercial code, CAESAR-II, which was especially developed for the structural analysis of pipes. This study conducted stress analyses of the same pipe unit, including loops, using both CAESAR-II and MSC/NASTRAN, and compared the results to investigate the characteristics of CAESAR-II. A parametric study was then conducted of the various design variables of pipe loops using CAESAR-II to draw some useful information about the structural characteristics of the loops.

Large scale flood inundation of Cambodia, using Caesar lisflood

  • Sou, Senrong;Kim, Joo-Cheol;Lee, Hyunsoek;Ly, Sarann;Lee, Giha;Jung, Kwansue
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2015년도 학술발표회
    • /
    • pp.211-211
    • /
    • 2015
  • Mekong River is the world's $10^{th}$ longest river and runs through China's Yunnan province, Burma, Thailand, Laos, Cambodia and Vietnam. And Tonle Sap Lake, the largest fresh water body in Southeast Asia and the heart of Mekong River system, covers an area $2,500-3,000Km^2$ in dry season and $10,000-16,000Km^2$ in wet season. As previously noted, the water within Sap river flows from the Mekong River to Tonle Sap Lake in flood season (between June and October) and backward to Mekong River in dry season. Recently the flow regime of Sap River might be significantly affected by the development of large dams in upstream region of Mekong River. This paper aims at basic study about the large scale flood inundation of Cambodia using by CAESAR-Lisflood. CAESAR-Lisflood is a geomorphologic / Landscape evolution model that combines the Lisflood-FP 2d hydrodynamic flow model (Bates et al, 2010) with the CAESAR geomorphic model to simulate flow hydrograph and erosion/deposition in river catchments and reaches over time scales from hours to 1000's of years. This model is based on the simplified full Saint-Venant Equation so that it can simulate the interacted flow of between Mekong River and Tonle Sap Lake especially focusing on the flow direction change of Sap River by season.

  • PDF

Cryptanalysis of the Authentication in ACORN

  • Shi, Tairong;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4060-4075
    • /
    • 2019
  • ACORN is an authenticated encryption algorithm proposed as a candidate in the currently ongoing CAESAR competition. ACORN has a good performance on security and efficiency which has been a third-round candidate. This paper mainly concentrates on the security of ACORN under the forgery attack and the non-repudiation of ACORN. Firstly, we analyze the differential properties of the feedback function in ACRON are analyzed. By taking advantage of these properties, the forgery attacks on round-reduced ACORN are proposed with a success probability higher than $2^{-128}$ when the number of finalization rounds is less than 87. Moreover, the non-repudiation of ACRON in the nonce-reuse setting is analyzed. The known collision can be used to deny the authenticated message with probability $2^{-120}$. This paper demonstrates that ACORN cannot generate the non-repudiation completely. We believe it is an undesirable property indeed.

A Symmetric Key Cryptography Algorithm by Using 3-Dimensional Matrix of Magic Squares

  • 이상호;김시호;정광호
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.768-770
    • /
    • 2013
  • We propose a symmetric key based cryptography algorithm to encode and decode the text data with limited length using 3-dimensional magic square matrix. To encode the plain text message, input text will be translated into an index of the number stored in the key matrix. Then, Caesar's shift with pre-defined constant value is fabricated to finalize an encryption algorithm. In decode process, Caesar's shift is applied first, and the generated key matrix is used with 2D magic squares to replace the index numbers in ciphertext to restore an original text.

Shakespeare's Roman Plays and His Skepticism

  • Park, WooSoo
    • 영어영문학
    • /
    • 제64권3호
    • /
    • pp.361-381
    • /
    • 2018
  • Shakespeare reflects/refracts the controversial spirit of his age in the epistemological and political skepticism of his Roman plays: Titus Andronicus, Julius Caesar, Coriolanus, and Antony and Cleopatra. Skepticism doubts all received truth and suspends judgment, and it often takes the form of mental jousting on both sides of a question. Renaissance skepticism was strengthened by rhetorical education. Arguing on both sides of the question (in utramquem partem) was a practice taught in Shakespeare's grammar school in order to enhance students' mental abilities in logic and dialectic. This rhetorical exercise seldom leads to a third-term resolution: it just reveals all the apparent and hidden aspects of a problem at issue. Shakespeare's Roman plays, especially his Julius Caesar, demonstrate this skeptical attitude, leaving the judgment to the audience.

한국산 일시 수확형 고추 후레이크의 특성 및 다양한 드레싱에의 품질에 미치는 영향 (Characteristics of Korean Single-harvested Pepper(Capsicum annuum, L.) Flakes and the Effects on the Quality of Various Dressings)

  • 김선아;구혜진;김경선;박재복
    • 한국식품조리과학회지
    • /
    • 제22권1호
    • /
    • pp.12-21
    • /
    • 2006
  • This study analyzed the characteristics of single-harvested pepper flakes and investigated the effects of the addition of red and green pepper flakes on the quality of various dressings. Moisture contents of red and green pepper flakes were $14.57{\pm}0.13%\;and\;11.86{\pm}0.12%$, capsaicinoids contents on a dry-weight basis were $207.91{\pm}6.68\;mg/100\;g\;and\;172.32{\pm}5.94\;mg/100\;g$, and total free sugars were $21.63{\pm}1.81%\;and\;12.49{\pm}0.56%$, respectively. ASTA color of red pepper flakes was $150.93{\pm}4.56$. Viable cell numbers of red and green pepper flakes were $3.9X10^4\;CFU/g\;and\;5.2X10^5\;CFU/g$, respectively. The pH values in French dressing and Italian dressing, with added red and green pepper flakes, were slightly increased, but not in American Caesar dressing. Acidity and viscosity weren't statistically different in the 3 kinds of dressings by the addition of red and green pepper flakes. The color difference $({\Delta}E^*_{ab})$ for the storage periods was calculated in each dressing and that of American Caesar dressing with added red pepper flakes was extremely high. Viable cell number in each dressing was maintained at 2 log CFU/g during the storage periods. The sensory characteristics during the storage periods were assessed by members of a trained panel, and showed that the color and pungency of red and green flakes increased the overall preference in the Italian dressing and American Caesar dressing.

교량에 설치된 도시가스배관의 안전관리에 관한 연구 (A Study on The Safety Management of City Gas Pipelines Attached on the Bridges)

  • 윤영만;손상근;최도균;이수경
    • 한국가스학회지
    • /
    • 제22권1호
    • /
    • pp.45-52
    • /
    • 2018
  • 이 논문에서는 도시가스 배관 중 교량에 설치된 배관 398개소에 대해 현황을 조사하고, 배관을 설치연도별, 길이별, 원격차단장치 설치여부 등 특성별로 분류하여 분석하였다. 분석결과 20년 이상 장기사용배관이 43.0%를 차지하고 있었고, 원격차단장치 미설치 교량배관은 89.4%에 달하는 등 드러난 현상에 대한 안전관리 방안을 제시하였다. 또한 조사된 교량설치 배관 중 76개소를 선정한 후 응력해석 전용프로그램인 CAESAR-II를 이용하여 응력특성을 연구하고, 교량배관 중 루프관을 설치할 경우 루프관의 위치 및 크기가 배관의 합성응력에 미치는 영향을 분석하였다. 본 연구의 결과를 통해 교량 배관의 설치, 검사 및 진단 기준 개선 등에 활용하여 교량설치 배관에 대한 안전성 향상에 도움이 될 수 있을 것으로 판단한다.

버나드 쇼의 『시저와 클레오파트라』에 나타난 동양과 여성 (The Orient and Women in Shaw's Caesar and Cleopatra)

  • 김경혜
    • 영미문화
    • /
    • 제9권1호
    • /
    • pp.51-70
    • /
    • 2009
  • For a long time Westerners have considered the Orient as unknown and mysterious, but Orientals soon came to be seen as weak and dependent, or feminine. The Oriental woman became a synecdoche for the Orient itself. We can find this theme in several British plays that deal with the Orient and Oriental women, including Shakespeare's Antony and Cleopatra and Dryden's All for Love. Both of these plays have Egypt as their setting and Cleopatra as a main character. For a better society, Shaw emphasizes the importance of education. In Caesar and Cleopatra, Shaw sees Egypt as a weak and dependent country which needs the help of Rome. Accordingly, he depicts Cleopatra as young and ignorant, needing to be educated in her role as a queen. Shaw finds possibilities for growth and independence in the Egyptians and Cleopatra, who recognize themselves as Egyptians and pursue their identity apart from the colonialization of Rome. Here the Egyptians attempt to resist and escape the oppression of Rome. Young, dependant and ignorant Cleopatra becomes independent and knowledgeable as the result of her education by Caesar and in the end she becomes a real Egyptian queen. According to Shaw, the Orient and women have the potential to develop themselves and ultimately to overcome the government of Western countries and men. In this play, Shaw emphasizes the potential of the Orient and women and the importance of education. Shaw thinks women can grow and develop through education. Especially through Cleopatra's growth, his thought can be applied for Oriental women as well as Western women. His thought is beyond the 19th century British society in which this play was written. Through this play, we can see Shaw's thought is not limited by race, time and place and also has universality to transcend everything.

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.