• Title/Summary/Keyword: Half-symmetry

Search Result 65, Processing Time 0.019 seconds

XMCD and PES study of a compensated-ferrimagnetic half-metal Mn3Ga

  • Seong, Seungho;Lee, Eunsook;Kim, Hee Yeon;Kim, Younghak;Baik, Jaeyoon;Kang, J.S.
    • Current Applied Physics
    • /
    • v.18 no.11
    • /
    • pp.1190-1195
    • /
    • 2018
  • By employing soft X-ray magnetic circular dichroism (XMCD), soft X-ray absorption spectroscopy (XAS), and photoemission spectroscopy (PES), we have investigated the electronic structure of the candidate zero-moment half-metallic $Mn_3Ga$. We have studied the ball-milled and annealed $Mn_3Ga$ powder samples that exhibit nearly zero magnetization. Mn 2p XAS revealed that Mn ions in $Mn_3Ga$ are nearly divalent for both of the Mn ions having the locally octahedral symmetry and those having the locally tetrahedral symmetry. The measured Mn 2p XMCD spectrum of $Mn_3Ga$ is very similar to that of ferrimagnetic $MnFe_2O_4$ having divalent Mn ions. The sum-rule analysis of the Mn 2p XMCD spectrum shows that both the spin and orbital magnetic moments of Mn ions in $Mn_3Ga$ are negligibly small, in agreement with the nearly compensated-ferrimagnetic ground state of $Mn_3Ga$. The valence-band PES spectrum of $Mn_3Ga$ agrees well with the calculated density of states, supporting the half-metallic electronic structure of $Mn_3Ga$.

Symmetry structured SPN block cipher algorithm (대칭구조 SPN 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Cho, Gyeong-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1093-1100
    • /
    • 2008
  • Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

  • PDF

Application of deep neural networks for high-dimensional large BWR core neutronics

  • Abu Saleem, Rabie;Radaideh, Majdi I.;Kozlowski, Tomasz
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2709-2716
    • /
    • 2020
  • Compositions of large nuclear cores (e.g. boiling water reactors) are highly heterogeneous in terms of fuel composition, control rod insertions and flow regimes. For this reason, they usually lack high order of symmetry (e.g. 1/4, 1/8) making it difficult to estimate their neutronic parameters for large spaces of possible loading patterns. A detailed hyperparameter optimization technique (a combination of manual and Gaussian process search) is used to train and optimize deep neural networks for the prediction of three neutronic parameters for the Ringhals-1 BWR unit: power peaking factors (PPF), control rod bank level, and cycle length. Simulation data is generated based on half-symmetry using PARCS core simulator by shuffling a total of 196 assemblies. The results demonstrate a promising performance by the deep networks as acceptable mean absolute error values are found for the global maximum PPF (~0.2) and for the radially and axially averaged PPF (~0.05). The mean difference between targets and predictions for the control rod level is about 5% insertion depth. Lastly, cycle length labels are predicted with 82% accuracy. The results also demonstrate that 10,000 samples are adequate to capture about 80% of the high-dimensional space, with minor improvements found for larger number of samples. The promising findings of this work prove the ability of deep neural networks to resolve high dimensionality issues of large cores in the nuclear area.

Design of Two - Dimensional IIR Digital Filters (2-차원 IIR 디지탈 필터의 설계)

  • Lee, Min-Ho;Park, Chong-Yeon
    • Journal of Industrial Technology
    • /
    • v.14
    • /
    • pp.3-17
    • /
    • 1994
  • This paper develops a design technique for approximating nonseparable frequency characteristics by sums and products of separable transfer functions. Therefore nonseparable frequency characteristics includes the four-quadrant symmetry filters. The desired filter with half plan symmetry is obtained by shifting a low pass characteristic in the frequency domain, and by combining these shifted characteristics. Also the paper develops the technique for designing recursive and nonrecursive two dimensional digital filters by the application of a complex transformation to one dimensional low pass filter.

  • PDF

Dynamics and instability of the Karman wake mode induced by periodic forcing

  • Mureithi, Njuki W.
    • Wind and Structures
    • /
    • v.7 no.4
    • /
    • pp.265-280
    • /
    • 2004
  • This paper presents some fundamental results on the dynamics of the periodic Karman wake behind a circular cylinder. The wake is treated like a dynamical system. External forcing is then introduced and its effect investigated. The main result obtained is the following. Perturbation of the wake, by controlled cylinder oscillations in the flow direction at a frequency equal to the Karman vortex shedding frequency, leads to instability of the Karman vortex structure. The resulting wake structure oscillates at half the original Karman vortex shedding frequency. For higher frequency excitation the primary pattern involves symmetry breaking of the initially shed symmetric vortex pairs. The Karman shedding phenomenon can be modeled by a nonlinear oscillator. The symmetrical flow perturbations resulting from the periodic cylinder excitation can also be similarly represented by a nonlinear oscillator. The oscillators represent two flow modes. By considering these two nonlinear oscillators, one having inline shedding symmetry and the other having the Karman wake spatio-temporal symmetry, the possible symmetries of subsequent flow perturbations resulting from the modal interaction are determined. A theoretical analysis based on symmetry (group) theory is presented. The analysis confirms the occurrence of a period-doubling instability, which is responsible for the frequency halving phenomenon observed in the experiments. Finally it is remarked that the present findings have important implications for vortex shedding control. Perturbations in the inflow direction introduce 'control' of the Karman wake by inducing a bifurcation which forces the transfer of energy to a lower frequency which is far from the original Karman frequency.

Effect of fractional order on energy ratios at the boundary surface of elastic-piezothermoelastic media

  • Kumar, Rajneesh;Sharma, Poonam
    • Coupled systems mechanics
    • /
    • v.6 no.2
    • /
    • pp.157-174
    • /
    • 2017
  • In the present investigation reflection and transmission of plane waves at an elastic half space and piezothermoelastic solid half space with fractional order derivative is discussed. The piezothermoelastic solid half space is assumed to have 6 mm type symmetry and assumed to be loaded with an elastic half space. It is found that the amplitude ratios of various reflected and refracted waves are functions of angle of incidence, frequency of incident wave and are influenced by the piezothermoelastic properties of media. The expressions of amplitude ratios and energy ratios are obtained in closed form. The energy ratios are computed numerically using amplitude ratios for a particular model of graphite and Cadmium Selenide (CdSe). The variations of energy ratios with angle of incidence are shown graphically. The conservation of energy across the interface is verified. Some cases of interest are also deduced from the present investigation.

Symmetry structured RC6 block cipher algorithm (대칭구조RC6블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.675-683
    • /
    • 2009
  • RC6 which has different algorithm of encryption and decryption has been proposed to have the same algorithm between encryption and decryption through inserting symmetry layer using simple rotate and logical operation. That means the half of whole RC6 round uses encryption algorithm and the rest of it uses decryption one and symmetry layer has been put into the middle of encryption and decryption. The proposed RC6 algorithm has no difference with the original one in the speed of process. However it is quite safe because by inserting symmetry layer the path of high probability which is needed for differential and linear analysis is cut off so that it is hard to be analyzed. The proposed symmetry layer algorithm can be easily applied to the algorithm which has different encryption and decryption and make it same, and it can be good idea to be used to design a new block cipher algorithm.

Symmetric structured SHACAL-1 block cipher algorithm (대칭구조 SHACAL-1 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Su;Kim, Jong-Nam;Jo, Gyeong-Yeon
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.4
    • /
    • pp.167-176
    • /
    • 2009
  • In this paper, we propose an improved SHACAL-1 of the same encryption and decryption with a simple symmetric layer. SHACAL-1 has 4 rounds, and each round has 20 steps. Decryption is becoming inverse function of encryption, In this paper, we proposed SHACAL-1 are composed of the first half, symmetry layer and the last half. The first half with SHACAL-1 encryption algorithm 1 round does with 10 steps and composes of 4 round. The last half identically with SHACAL-1 decryption algorithm, has a structure. On the center inserts a symmetry layer, encryption and decryption algorithm identically, composes. In the experiments, the proposed SHACAL-1 algorithm showed similar execution time to that of the SHACAL-1. Thanks to the symmetric layer, the proposed algorithm makes it difficult for the attacks which take advantages of high probability path such as the linear cryptanalysis, differential cryptanalysis. The proposed algorithm can be applicable to the other block cipher algorithms which have different encryption and decryption and useful for designing a new block cipher algorithm.

  • PDF

Effect of zero imputation methods for log-transformation of independent variables in logistic regression

  • Seo Young Park
    • Communications for Statistical Applications and Methods
    • /
    • v.31 no.4
    • /
    • pp.409-425
    • /
    • 2024
  • Logistic regression models are commonly used to explain binary health outcome variable using independent variables such as patient characteristics in medical science and public health research. Although there is no distributional assumption required for independent variables in logistic regression, variables with severely right-skewed distribution such as lab values are often log-transformed to achieve symmetry or approximate normality. However, lab values often have zeros due to limit of detection which makes it impossible to apply log-transformation. Therefore, preprocessing to handle zeros in the observation before log-transformation is necessary. In this study, five methods that remove zeros (shift by 1, shift by half of the smallest nonzero, shift by square root of the smallest nonzero, replace zeros with half of the smallest nonzero, replace zeros with the square root of the smallest nonzero) are investigated in logistic regression setting. To evaluate performances of these methods, we performed a simulation study based on randomly generated data from log-normal distribution and logistic regression model. Shift by 1 method has the worst performance, and overall shift by half of the smallest nonzero method, replace zeros with half of the smallest nonzero method, and replace zeros with the square root of the smallest nonzero method showed comparable and stable performances.

Encryption/Decryption the same improved RC6 algorithm (암호/복호를 동일하게 개선한 RC6 알고리즘)

  • Kim, Gil-Ho;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.247-250
    • /
    • 2008
  • RC6 which has different algorithm of encryption and decryption has been implemented to have the same algorithm between encryption' and decryption though inserting symmetry layer using simple rotate and logical operation. That means the half of whole RC6 round uses encryption algorithm and the rest of it uses decryption one and symmetry layer has been put into the middle of encryption and decryption. The proposed RC6 algorithm has no difference with the original one in the speed of process. However it is quite safe because by inserting symmetry layer the path of high probability which is needed for differential and linear analysis is cut oft so that it is hard to be analyzed. The proposed algorithm can be easily applied to the algorithm which has different encryption and decryption an make it same, and it can be good idea to be used to design a new block cipher algorithm.

  • PDF