• Title/Summary/Keyword: ID curve

Search Result 58, Processing Time 0.022 seconds

Evaluation of the antegonial notch related to the mandibular morphology and the curve of Spee in anteroposterior relation (전후방적 분류에 따른 하악 형태 및 Spee 만곡에 대한 antegonial notch의 관계 평가)

  • Son, J-H;Kim, Y-H;Kook, Y-A
    • The Journal of the Korean dental association
    • /
    • v.45 no.8 s.459
    • /
    • pp.483-490
    • /
    • 2007
  • The aim of this study was to investigate the relationship between the mandibular antegonial notch and the mandibular morphology, and the curve of Spee in anteroposterior skeletal relationship. Pre-treatment lateral cephalograms were obtained from 80(male 34, female 46) adult orthodontic patients and the samples were classified into 3 categories by ANB angle($0^{\circ}$$\leq$ANB< $4^{\circ}$ Class I, $4^{\circ}$$\leq$ANB Class II, ANB< $0^{\circ}$ Class III). The curve of Spee was measured directly from the pre-treatment mandibular study cast of each patient included in this study. Pearson correlation coefficient test and multiple regression analysis in each group revealed the following results; 1. Antegonial notch depth was positively correlated with hoth lower anterior facial height(ANS-Me) in skeletal Class I, II and III groups and Id-Me height in skeletal Class I and II groups. 2. A statistically significant negative correlation was found between the depth of the antegonial notch and the curve of Spee in the Class III group. 3. Significant relationship was not found between the antegonial notch depth and any of the other cephalometric variables such as mandibular body length(Go-Gn) and ramus height(Co-Go). As antegonial notch depth increased, more vertical growth of the mandible was observed. Antegonial notch can be used as a predictor of vertical mandibular growth in the diagnosis and treatment planning of malocclusion.

  • PDF

PWSCC Crack Growth Analysis Using Numerical Method in the Inner Surface Repair Weld of A Nozzle (노즐 이종금속용접부의 내면 보수용접부에서 수치해석법을 이용한 PWSCC 균열성장해석)

  • Kim, Sang-Chul;Kim, Mann-Won
    • Journal of Welding and Joining
    • /
    • v.29 no.2
    • /
    • pp.64-71
    • /
    • 2011
  • In this paper, crack propagation analyses in the inner diameter (ID) repair weld of the dissimilar metal weldment of a nozzle were performed using a finite element alternating method (FEAM). To calculate the theoretical solution for the crack tip stress intensity factor, a weak type singular integral equation consisted of crack surface traction and dislocation density function was constructed and solved in conjunction with the FEAM. A two-dimensional axisymmetric finite element nozzle model was prepared and ID repair welding was simulated. An initial crack, 10% depth of weld thickness, was assumed and crack propagation trajectory from the initial crack to the 75% depth of thickness was calculated using the FEAM. Crack growth versus time curve was also calculated and compared with the curves obtained from ASME code method. With the method constructed in this paper, crack propagation trajectory and crack growth time were calculated automatically and effectively.

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

A Study on Characteristics of Wet Oxide Gate and Nitride Oxide Gate for Fabrication of NMOSFET (NMOSFET의 제조를 위한 습식산화막과 질화산화막 특성에 관한 연구)

  • Kim, Hwan-Seog;Yi, Cheon-Hee
    • The KIPS Transactions:PartA
    • /
    • v.15A no.4
    • /
    • pp.211-216
    • /
    • 2008
  • In this paper we fabricated and measured the $0.26{\mu}m$ NMOSFET with wet gate oxide and nitride oxide gate to compare that the charateristics of hot carrier effect, charge to breakdown, transistor Id_Vg curve, charge trapping, and SILC(Stress Induced Leakage Current) using the HP4145 device tester. As a result we find that the characteristics of nitride oxide gate device better than wet gate oxide device, especially hot carrier lifetime(nitride oxide gate device satisfied 30 years, but the lifetime of wet gate oxide was only 0.1 year), variation of Vg, charge to breakdown, electric field simulation and charge trapping etc.

A Hilbert Curve-based Query Integrity Auditing Method for Encrypted Data in Database Outsourcing (데이터베이스 아웃소싱 환경에서 암호화된 데이터를 위한 힐버트 커브 기반 질의 결과 무결성 검증 기법)

  • Youn, Deulnyeok;Jang, Miyoung;Chang, Jae-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.804-807
    • /
    • 2013
  • 최근 클라우드 컴퓨팅에 대한 관심이 고조됨에 따라, 이를 활용한 데이터베이스 아웃소싱(Outsourcing)에 대한 연구가 활발히 진행되고 있다. 그러나 아웃소싱 된 데이터베이스는 사용자 개인 정보, 증권, 또는 의료 정보 등 민감한 정보를 포함하기 때문에 서비스 제공자로부터 수행한 질의 결과 데이터가 데이터 소유자로부터 생성된 데이터이며, 정확한 질의 결과를 포함하는지 확인하기 위한 질의 결과 무결성 검증 기법의 필요성이 대두되었다. 기존 질의 결과 무결성 검증 기법은 질의 결과에 포함되는 무결성 검증 데이터의 크기가 증가하여 검증 데이터 전송 오버헤드 증가 및 데이터 노출 위험 증가 문제를 지닌다. 따라서, 본 논문에서는 데이터 보호를 지원하는 암호화 데이터 기반 질의 결과 무결성 검증 기법을 제안한다. 제안하는 질의 결과 무결성 검증 기법은 암호화된 데이터 그룹을 주기 함수를 이용하여 재분할하고, 최종 데이터 그룹 id를 힐버트 커브를 통해 변환한다. 따라서, 검증 데이터 오버헤드를 감소시켜 효율적인 질의 처리를 지원하며, 그룹 id 변경을 통해 검증 데이터 유출 위험을 방지한다. 성능평가를 통해, 제안하는 기법이 기존 기법에 비해 질의 처리 시간 측면에서 평균 2배, 검증 데이터 오버헤드 측면에서 최대 20배의 성능을 개선함을 보인다.

Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System (아핀좌표를 사용하는 페어링 연산의 Miller 알고리듬에 대한 효과적인 오류주입공격)

  • Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.11-25
    • /
    • 2011
  • The Miller algorithm is employed in the typical pairing computation such as Weil, Tate and Ate for implementing ID based cryptosystem. By analyzing the Mrabet's attack that is one of fault attacks against the Miller algorithm, this paper presents au efficient fault attack in Affine coordinate system, it is the most basic coordinates for construction of elliptic curve. The proposed attack is the effective model of a count check fault attack, it is verified to work well by practical fault injection experiments and can omit the probabilistic analysis that is required in the previous counter fault model.

Evaluation of sensitivity of soil respiration to temperature in different forest types and developmental stages of maturity using the incubation method

  • Lee, Eun-Hye;Suh, Sang-Uk;Lee, Chang-Seok;Lee, Jae-Seok
    • Journal of Ecology and Environment
    • /
    • v.35 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • To calculate and predict soil carbon budget and cycle, it is important to understand the complex interrelationships involved in soil respiration rate (Rs). We attempted to reveal relationships between Rs and key environmental factors, such as soil temperature, using a laboratory incubation method. Soil samples were collected from mature deciduous (MD), mature coniferous (MC), immature deciduous (ID), and immature coniferous (IC) forests. Prior to measure, soils were pre-incubated for 3 days at $25^{\circ}C$ and 60% of maximum water holding capacity (WHC). Samples of gasses were collected with 0, 2, and 4 h interval after the beginning of the measurement at soil temperatures of 5, 15, 25, and $35^{\circ}C$ (at 60% WHC). Air samples were collected using a syringe attached to the cap of closed bottles that contained the soil samples. The $CO_2$ concentration of each gas sample was measured by gas chromatography. Rs was strongly correlated with soil temperature (r, 0.93 to 0.96; P < 0.001). For MD, MC, ID, and IC soils taken from 0-5 cm below the surface, exponential functions explained 90%, 82%, 92%, and 86% of the respective data plots. The temperature and Rs data for soil taken from 5-10 cm beneath the surface at MD, MC, ID, and IC sites also closely fit exponential functions, with 83%, 95%, 87%, and 89% of the data points, respectively, fitting an exponential curve. The soil organic content in mature forests was significantly higher than in soils from immature forests (P < 0.001 at 0-5 cm and P < 0.005 at 5-10 cm) and surface layer (P = 0.04 at 0-5 cm and P = 0.12). High soil organic matter content is clearly associated with high Rs, especially in the surface layer. We determined that the incubation method used in this study have the possibility for comprehending complex characteristic of Rs.

Comparative Study of Machine learning Techniques for Spammer Detection in Social Bookmarking Systems (소셜 복마킹 시스템의 스패머 탐지를 위한 기계학습 기술의 성능 비교)

  • Kim, Chan-Ju;Hwang, Kyu-Baek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.345-349
    • /
    • 2009
  • Social bookmarking systems are a typical web 2.0 service based on folksonomy, providing the platform for storing and sharing bookmarking information. Spammers in social bookmarking systems denote the users who abuse the system for their own interests in an improper way. They can make the entire resources in social bookmarking systems useless by posting lots of wrong information. Hence, it is important to detect spammers as early as possible and protect social bookmarking systems from their attack. In this paper, we applied a diverse set of machine learning approaches, i.e., decision tables, decision trees (ID3), $na{\ddot{i}}ve$ Bayes classifiers, TAN (tree-augment $na{\ddot{i}}ve$ Bayes) classifiers, and artificial neural networks to this task. In our experiments, $na{\ddot{i}}ve$ Bayes classifiers performed significantly better than other methods with respect to the AUC (area under the ROC curve) score as veil as the model building time. Plausible explanations for this result are as follows. First, $na{\ddot{i}}ve$> Bayes classifiers art known to usually perform better than decision trees in terms of the AUC score. Second, the spammer detection problem in our experiments is likely to be linearly separable.

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates (타원곡선 좌표계를 이용한 RFID 다중객체 간 인증 암호기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.43-50
    • /
    • 2008
  • Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.

  • PDF

Efficient Rate Control by Lagrange Multiplier Using Adaptive Mode Selection in Video Coding (비디오 코팅시 Lagrage 승수를 조정하여 적응 모드 선택에 따른 비트율의 제어)

  • Ryu, Chul;Kim, Seung P.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.77-88
    • /
    • 2000
  • This paper presents an approach for rate control by adaptively selecting macroblock modes in video coding.The problem of rate control has been investigated by many authors where quantizer level is adjustedbased on the buffer fullness. The proposed approach is different fron the previous ones [4] id that it finds the optimal decision curve rather than finding a set of the modes. Proposed algorithm extends the coding decision options for rate control to motion/no-motion compensation as well as inter/intra decisions. Instead of having a fixed motion/no-notion compensation or inter/intra decision curve, one can utilize an adaptive decision curvebased on the characteristics of input frames so that the PSNR at a given bit rate is maximized. Therefore, the proposed approach provides better rate control than simple quantizer feedback approach interns of visual quality. The curve is obtained by utilizing simulated annealing optimization technique. Thealgorithm is implemented and simulations are compared with other approaches within H.261 video codec.

  • PDF