• 제목/요약/키워드: Primitive

Search Result 1,239, Processing Time 0.027 seconds

A NOTE ON THE UNITS OF MANTACI-REUTENAUER ALGEBRA

  • Arslan, Hasan;Can, Himmet
    • Bulletin of the Korean Mathematical Society
    • /
    • v.55 no.4
    • /
    • pp.1037-1049
    • /
    • 2018
  • In this paper, we have first presented the construction of the linear characters of a finite Coxeter group $G_n$ of type $B_n$ by lifting all linear characters of the quotient group $G_n/[G_n,G_n]$ of the commutator subgroup $[G_n,G_n]$. Also we show that the sets of distinguished coset representatives $D_A$ and $D_{A^{\prime}}$ for any two signed compositions A, A' of n which are $G_n$-conjugate to each other and for each conjugate class ${\mathcal{C}}_{\lambda}$ of $G_n$, where ${\lambda}{\in}\mathcal{BP}(n)$, the equality ${\mid}{\mathcal{C}}_{\lambda}{\cap}D_A{\mid}={\mid}{\mathcal{C}}_{\lambda}{\cap}D_{A^{\prime}}{\mid}$ holds. Finally, we have given the general structure of units of Mantaci-Reutenauer algebra.

프라이버시 보존 분류 방법 동향 분석

  • Kim, Pyung;Moon, Su-Bin;Jo, Eun-Ji;Lee, Younho
    • Review of KIISC
    • /
    • v.27 no.3
    • /
    • pp.33-41
    • /
    • 2017
  • 기계 학습(machine-learning) 분야의 분류 알고리즘(classification algorithms)은 의료 진단, 유전자 정보 해석, 스팸 탐지, 얼굴 인식 및 신용 평가와 같은 다양한 응용 서비스에서 사용되고 있다. 이와 같은 응용 서비스에서의 분류 알고리즘은 사용자의 민감한 정보를 포함하는 데이터를 이용하여 학습을 수행하는 경우가 많으며, 분류 결과도 사용자의 프라이버시와 연관된 경우가 많다. 따라서 학습에 필요한 데이터의 소유자, 응용 서비스 사용자, 그리고 서비스 제공자가 서로 다른 보안 도메인에 존재할 경우, 프라이버시 보호 문제가 발생할 수 있다. 본 논문에서는 이러한 문제를 해결하면서도 분류 서비스를 제공할 수 있도록 도와주는 프라이버시 보존 분류 프로토콜(privacy-preserving classification protocol: PPCP) 에 대해 소개한다. 구체적으로 PPCP의 프라이버시 보호 요구사항을 분석하고, 기존의 연구들이 프라이버시 보호를 위해 사용하는 암호학적 기본 도구(cryptographic primitive)들에 대해 소개한다. 최종적으로 그러한 암호학적 기본 도구를 사용하여 설계된 프라이버시 보존 분류 프로토콜에 대한 기존 연구들을 소개하고 분석한다.

Analysis of Shrinking Generator Using Phase Shifts (위상이동차를 이용한 수축 생성기의 분석)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2507-2513
    • /
    • 2010
  • In this paper, we show that the shrinking generator with two LFSR whose characteristic polynomials are primitive is an interleaving generator and analyze phase shifts in shrunken sequence. Also for a given intercepted sequence of shrunken sequence, we propose. the method of reconstructing some deterministic bits of the shrunken sequence using phase shifts.

Changes of Kitchen Lifespace in Korean Family Houses - from the Old Stone Age to the Koryo Dynasty - (한국부엌의 변천- 구석기시대부터 고려시대까지 -)

  • 윤복자
    • Journal of the Korean housing association
    • /
    • v.5 no.2
    • /
    • pp.41-50
    • /
    • 1994
  • The purpose of this study is to investigate changes of the kitchen lifespace in Korean family houses from the Old Stone Age to the Koryo Dynasty. The documentary research method was used for this study. The major findings were as follows the changes of kitchen lifespace in Korean family houses form the Old Stone Age to the Koryo Dynasty have been affected by natural, political, economic, technological, and socio-cultural environments. The Kitchen lifespace of these periods was categorized into six categories: the Beginings Period of the Kitchen, the Period of the Primitive Kitchen, the Formative Period of the Kitchen, the Enlargement Period of the Kitchen, the Separation Period of the Kitchen, and the Begining Period of the Traditional Kitchen.

  • PDF

Design of Cryptographic Hardware Architecture for Mobile Computing

  • Kim, Moo-Seop;Kim, Young-Sae;Cho, Hyun-Sook
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.187-196
    • /
    • 2009
  • This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.

PERFORMANCE OF TWO DIFFERENT HIGH-ACCURACY UPWIND SCHEMES IN INVISCID COMPRESSIBLE FLOW FIELDS

  • Hosseini R;Rahimian M.H;Mirzaee M
    • Journal of computational fluids engineering
    • /
    • v.10 no.1
    • /
    • pp.99-106
    • /
    • 2005
  • Performance of first, second and third order accurate methods for calculation of in viscid fluxes in fluid flow governing equations are investigated here. For the purpose, an upwind method based on Roe's scheme is used to solve 2-dimensional Euler equations. To increase the accuracy of the method two different schemes are applied. The first one is a second and third order upwind-based algorithm with the MUSCL extrapolation Van Leer (1979), based on primitive variables. The other one is an upwind-based algorithm with the Chakravarthy extrapolation to the fluxes of mass, momentum and energy. The results show that the thickness of shock layer in the third order accuracy is less than its value in second order. Moreover, applying limiter eliminates the oscillations near the shock while increases the thickness of shock layer especially in MUSCL method using Van Albada limiter.

A Study on the Spatial Factors in Traditional Retail Market Remodeling (재래시장 리모델링 사업에서의 공간 구성요소에 관한 연구)

  • Oh, Bong-Seok;Kim, Nam-Hyo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.112-115
    • /
    • 2004
  • The government is in progress the traditional retail market redevelopment and remodeling due to atrophy of the traditional retail market in accordant to opening of the circulation market and changing of the consuming patterns. However, it seemed that primitive project was limited to the environment improvement scope. As the shopping environment which is comfortable to the consumers is provided and the design which considers a traditional retail market specific quality is applied from business plan early. It will be useful for the management normalization of traditional retail market actually. The spatial factors were analyzed as follows. 1. The circulation of consumer should be secured to make boundary line of the pass way. 2. The display booth should be standardized for the security of sight. 3. The signage panel should be consolidated in according to the plan. 4. The street vendor's handcart and tent should be arranged for circulations and the vision line.

  • PDF

Pulmonary Blastoma - A Case Report (폐아세포종;1례 보고)

  • 김영삼
    • Journal of Chest Surgery
    • /
    • v.25 no.9
    • /
    • pp.900-904
    • /
    • 1992
  • Pulmonary blastoma is a very rare, primary, malignant neoplasm of the lung. The tumor typically is large, well-defined mass and arises in the periphery of the lung. Histologically, it resembles fetal lung tissue evoking the concept that these tumors are drived from the primitive pluripotential pulmonary blastema, but controversy also exit about the nature of this tumor. Clinical evaluation is inconsistant and unreliable as to the diagnostic determination of the tumor type and degree of malignancy. Therefore, diagnosis is usually based on histologic findings. The prognosis after adequate resection appears to be better than for other malignant tumors of the lungs. We experienced a case of pulmonary blastoma occurring in 56-year-old female. She was hospitalized for evaluation of an abnormal shadow in the left lower lung field which found incidentally on chest roentgenogram. We approached the lesion though left posterolateral thoracotomy and performed the left lower lobectomy. The microscopic findings of resected specimen revealed characteristic appearance of pulmonary blastoma. The postoperative course was uneventful without complication.

  • PDF

건물자동화장비(BAS)

  • 강인구;이봉훈
    • Journal of the Korean Professional Engineers Association
    • /
    • v.16 no.1
    • /
    • pp.48-54
    • /
    • 1983
  • Building management cost increases enormously as modern buildings become complicated. Lost of building eveners or managers feel the need to cut down the cost not sacrifying Comfort building environment and building safety, The ways to achieve such goal are maintaing with a few person, proper HVAC scheduling to save energy BAS's i.e the building automation system or building maintenance system, are designed to meet the goal. In korea, imported BAS's have been installed past several years. Difficulties arised in several aspects. One is extra high cost in installing BAS's because of marginal coat. Another is long settling time because it is originated from abroad. GSC/85/30 is the first trial as a korean BAS to minimize such difficulties. Even though it is a primitive system, it is a mileston of korean BAS the technics gained from developing GSCI/85/30 can be utilized to develop higher version and is now. As modern buildings become more complicated and hugy, managers owner of buildings seek for the system to manage building properly. BAS(Building Automation System or Building management system) is designed to meet the need.

  • PDF

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds

  • Lu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2703-2718
    • /
    • 2015
  • Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is a public-key primitive that can delegate the decryption right from one user to another. In a proxy re-encryption system, a semi-trusted proxy authorized by a data owner is allowed to transform an encrypted data under the data owner's public key into a re-encrypted data under an authorized recipient's public key without seeing the underlying plaintext. Hence, the paradigm of proxy re-encryption provides a promising solution to effectively share encrypted data. In this paper, we propose a new certificate-based proxy re-encryption scheme for encrypted data sharing in public clouds. In the random oracle model, we formally prove that the proposed scheme achieves chosen-ciphertext security. The simulation results show that it is more efficient than the previous certificate-based proxy re-encryption schemes.