• Title/Summary/Keyword: Public Library 2.0

검색결과 71건 처리시간 0.028초

8 비트 센서 노드 상에서 효율적인 공개키 암호를 위한 다정도 제곱 연산의 최적화 (Optimizing Multiprecision Squaring for Efficient Public Key Cryptography on 8-bit Sensor Nodes)

  • 김일희;박용수;이윤호
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제36권6호
    • /
    • pp.502-510
    • /
    • 2009
  • Multiprecision Squaring은 공개키 알고리즘을 구성하는 연산 중에서 가장 중요한 연산 중 하나이다. 본 논문에서는 기존의 Multiprecision Squaring 알고리즘을 개선하여 연산 양을 줄임으로 성능을 항상시키는 Squaring 기법들을 제시하고 구현하였다. Scott이[1]에서 제안한 Carry-Catcher Hybrid 곱셈 알고리즘은 Gura가 제안한 Hybrid 곱셈 알고리즘[2]을 계승 발전시킨 것으로 MRACL 라이브러리에 구현되어 있으며, Carry-Catcher Hybrid 방법 사용한 Multiprecision Squaring 알고리즘도 MIRACL에 함께 구현되어 있다. 본 논문에서 이 Carry-Catcher Hybrid Squaring 알고리즘을 발전시켜 보다 효율적인 Squaring 알고리즘인 Lazy Doubling Squaring 알고리즘을 제안하고 구현하였으며, atmega128상에서 성능테스터를 수행하여 Carry-Catcher Hybrid Squaring 알고리즘과 비교하여 더 효율적인 알고리즘임을 보였다. 표준 Squaring 알고리즘이 $S_{ij}\;=\;x_i\;{\ast}\;x_j\;=\;S_{ij}$인 사실을 기반으로 곱셈의 횟수를 절반 가까이 줄인 알고리즘이라면 본 논문에서 제시한 Lazy Doubling Squaring 알고리즘은 $a_0\;{\ast}\;2\;+\;a_1\;{\ast}\;2\;+\;...\;+\;a_{n-1}\;{\ast}\;2\;+\;a_n\;{\ast}\;2\;=\;(a_0\;+\;a_1\;+\;...\;+\;a_{n-1}\;+\;a_n)\;{\ast}\;2$ 라는 사실을 기반으로 하여 doubling 연산 횟수를 획기적으로 줄인 알고리즘으로, MIRACL에 구현되어 있는 Multiprecision Squaring 알고리즘 보다 atmega128상에서 약 25% 정도의 빠른 결과를 얻을 수 있었으며, 저자가 아는 바로는 현재까지 나온 어떤 방법보다 빠르다.

교양명저 선정제도

  • 변우열
    • 한국도서관정보학회지
    • /
    • 제13권
    • /
    • pp.59-84
    • /
    • 1986
  • This paper is a study of the system of liberal great books selection in universities of Korea. A questionnaire consisted of 14 questions was sent to 46 universities of which 42 universities responded. Results of the study can be summarized as follows: 1) Liberal great books selection system was operated 40% of universities, but 60% was not operated because of not preparation and without perception of necessity. 2) The name of liberal great books was varied in 11 kinds of 16 universities. It is desirable that the name is unified. 3) The founded year of liberal great books selection system was new comparatively with enhanced liberal education. 4) The greater part of liberal great books format were a leaf of catalog, but it is desirable that book form catalog with review for induction of reading interests. 5) It is desirable that renewal of liberal great books are irregularly in answer to a need. 6) It is a n.0, ppeared that selection of liberal great books were by professor, but it is desirable that selection is by many people of all parts without prejudices and subjectivity. 7) The title of liberal great books were 121 titles in average. It is desirable that the titles are about 100 titles for expected results. 8) In a duplicates of liberal great books, 5 copy is much more than other cases. It is desirable that the duplicates depend on students, use rates, budget etc. of universities. 9) Use rates of liberal great books are much more than other books, but it is necessary that public relations and stimulation of reading for most use. 10) In subject analysis, liberal great books consisted of humanities, social sciences and novel mainly. Specially, literature is 33% of the total. 11) Liberal great books consisted of occidental works and literature mainly. 12) It is a n.0, ppeared that analysis of a n.0, ppointment frequency was scattered exceedingly.

  • PDF

Text Mining and Visualization of Papers Reviews Using R Language

  • Li, Jiapei;Shin, Seong Yoon;Lee, Hyun Chang
    • Journal of information and communication convergence engineering
    • /
    • 제15권3호
    • /
    • pp.170-174
    • /
    • 2017
  • Nowadays, people share and discuss scientific papers on social media such as the Web 2.0, big data, online forums, blogs, Twitter, Facebook and scholar community, etc. In addition to a variety of metrics such as numbers of citation, download, recommendation, etc., paper review text is also one of the effective resources for the study of scientific impact. The social media tools improve the research process: recording a series online scholarly behaviors. This paper aims to research the huge amount of paper reviews which have generated in the social media platforms to explore the implicit information about research papers. We implemented and shown the result of text mining on review texts using R language. And we found that Zika virus was the research hotspot and association research methods were widely used in 2016. We also mined the news review about one paper and derived the public opinion.

A Scalable Structure for a Multiplier and an Inversion Unit in $GF(2^m)$

  • Lee, Chan-Ho;Lee, Jeong-Ho
    • ETRI Journal
    • /
    • 제25권5호
    • /
    • pp.315-320
    • /
    • 2003
  • Elliptic curve cryptography (ECC) offers the highest security per bit among the known public key cryptosystems. The operation of ECC is based on the arithmetic of the finite field. This paper presents the design of a 193-bit finite field multiplier and an inversion unit based on a normal basis representation in which the inversion and the square operation units are easy to implement. This scalable multiplier can be constructed in a variable structure depending on the performance area trade-off. We implement it using Verilog HDL and a 0.35 ${\mu}m$ CMOS cell library and verify the operation by simulation.

  • PDF

비알코올성 지방간 질환에 대한 침치료의 효과 : 체계적 고찰 (Clinical Effectiveness of Acupuncture in the Treatment of Non-Alcoholic Fatty Liver Disease: A Systematic Review)

  • 현준;이주복;김소연;한창우
    • 대한한방내과학회지
    • /
    • 제39권6호
    • /
    • pp.1206-1224
    • /
    • 2018
  • Purpose: This systematic review was planned and performed in order to determine the clinical effectiveness of acupuncture for non-alcoholic fatty liver disease (NAFLD). Methods: We searched related randomized controlled trials in several medical online databases, including China National Knowledge Infrastructure (CNKI), Excerpta Medica dataBASE (EMBASE), Public/Publisher MEDLINE (PubMed), Cochrane Central Register of Controlled Trials (CENTRAL), National Digital Science Library (NDSL), and Research Information Sharing Service (RISS). NAFLD related outcomes were extracted from the included trials and meta-analyzed. Results: From the 8 included trials, the values of the following examinations were extracted: liver ultrasonography, liver CT, body fat CT, aspartate transaminase (AST), alanine transaminase (ALT), gamma-glutamyltransferase (GGT), total cholesterol (TC), triglyceride (TG), low density lipoprotein (LDL) cholesterol, high density lipoprotein (HDL) cholesterol, fasting blood sugar (FBS), hosmeostatic model assessment for insulin resistance (HOMA-IR), weight, body mass index (BMI), waist hip ratio (WHR), obesity degree, body fat mass, body fat rate, leptin, malondialdehyde (MDA), and super oxide dismutase (SOD). In the 4 outcomes, cure rate in liver ultrasonography (RR=1.56; 95%CI=1.05~2.31; P=0.03), cure rate in liver CT (RR=2.23; 95%CI=1.33~3.72; P=0.002), TC (MD=-0.78; 95%CI=-1.41~-0.15; P=0.02), and TG (MD=-2.05; 95%CI=-3.88~-0.21; P=0.03), acupuncture was more effective than the control intervention. Conclusions: In this meta-analysis, acupuncture relieved hepatic steatosis, and reduced TC, and TG in NAFLD patients. more well-planned studies are still needed due to the heterogeneity and the considerable methodological flaws in the analyzed trials.

Accuracy of Phishing Websites Detection Algorithms by Using Three Ranking Techniques

  • Mohammed, Badiea Abdulkarem;Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.272-282
    • /
    • 2022
  • Between 2014 and 2019, the US lost more than 2.1 billion USD to phishing attacks, according to the FBI's Internet Crime Complaint Center, and COVID-19 scam complaints totaled more than 1,200. Phishing attacks reflect these awful effects. Phishing websites (PWs) detection appear in the literature. Previous methods included maintaining a centralized blacklist that is manually updated, but newly created pseudonyms cannot be detected. Several recent studies utilized supervised machine learning (SML) algorithms and schemes to manipulate the PWs detection problem. URL extraction-based algorithms and schemes. These studies demonstrate that some classification algorithms are more effective on different data sets. However, for the phishing site detection problem, no widely known classifier has been developed. This study is aimed at identifying the features and schemes of SML that work best in the face of PWs across all publicly available phishing data sets. The Scikit Learn library has eight widely used classification algorithms configured for assessment on the public phishing datasets. Eight was tested. Later, classification algorithms were used to measure accuracy on three different datasets for statistically significant differences, along with the Welch t-test. Assemblies and neural networks outclass classical algorithms in this study. On three publicly accessible phishing datasets, eight traditional SML algorithms were evaluated, and the results were calculated in terms of classification accuracy and classifier ranking as shown in tables 4 and 8. Eventually, on severely unbalanced datasets, classifiers that obtained higher than 99.0 percent classification accuracy. Finally, the results show that this could also be adapted and outperforms conventional techniques with good precision.

온라인 열람목록 (OPAC) 이용자의 능력에 관한 비교연구 (A comparative study of user interaction when using Online Public Access Catalogs)

  • 박일종
    • 한국문헌정보학회지
    • /
    • 제30권2호
    • /
    • pp.167-188
    • /
    • 1996
  • 도서관리 전산화된 정보시스템에서 어떤 특정 이용자그룹에 대한 특성과 이용 능력에 대한 이해의 부족으로 일과 그 관련 얻은 종사자들이 정보1.)스틸을 개발하고 채택하고 운영함에 있어 최상의 선택을 하는 데 사실상 큰 어려움을 겪어 왔다. 본 연구는 한국 내에서의 이용자, 유학생 이용자, 남학생 여학생, 학부생, 대학원생 둥과 같은 특정 이용자 집단의 특성과 이용 능력에 관한 조사를 목적으로 이루어 겼다. 또한 OPAC 사용법을 배우는 경로에 대한 연구와 비 이용자 연구도 동시에 행해졌다. 설문 조사는 대구 지역과 미 Texas지역에 유학 중인 학생들을 대상으로 실시하였으며, 345개의 이용 가능한 데이터를 수진 분석하였다. 여러 종류의 기술적, 추리적, 다변량적 통계분석 방법들을 SPSS의 도움을 얻어 적용하였다. 본 연구에서는 (1)특정 학생 이용자집단의 OPAC에 대한 지식의 분포에서는 통계적으로 유의한 차이가 있었지만. 학부생집단과 예체능 전공의 학생들의 그룹 비교에서는 예외적으로 유의한 차이가 나타나지 않았다. (2)응답자들이 OPAC시스템을 사용할 때 알고 있는 탐색 방법의 숫자와 컴퓨터 사용 시간의 상관관계는 다른 어떤 변수의 상관 계수보다 높았고 컴퓨터 이용 연한, 이용 빈도, OPAC이용 빈도는 도서관 이용 빈도와 수작업 카드 목록의 이용 빈도보다 비교적 높았다는 사실을 밝혀 냈으며, 아울러 이 변수들의 상관 계수와 그 상관 관계들의 순위까지 명확히 제시하였다. 또한 어떤 새로운 시스템을 개발하거나, 채택하거나 이를 운영할 때 참조할 수 있는 결론과 추천하는 내용, OPAC 시스템의 성격을 연구하고자 할 때의 미래 연구 주제도 제안하였다.

  • PDF

암 환자의 한의학 치료 이용 현황 (Use of Korean Medicine among Cancer Patients)

  • 최유진;이지수;조성훈
    • 대한한의학회지
    • /
    • 제33권3호
    • /
    • pp.46-53
    • /
    • 2012
  • Objectives: Many cancer patients have been using Korean medicine with conventional medical care. This study aimed to look into current status of Korean medicine in cancer patients in Korea. Methods: We reviewed utilization of Korean medicine for cancer by searching DB (KoreaMed, KMbase, KISS, NDSL, KISTI, National Assembly Library, OASIS, Korean Traditional Knowledge Portal). The first search keyword used was "cancer" and the second keyword used was either "oriental", "alternative" or "complementary". Results: The utilization rate of Korean medicine was 31.0%. In terms of patient's disease characteristics, most of them were suffering from stomach cancer, lung cancer and colon cancer. Most of them were diagnosed as fourth stage of cancer. Ginseng (14.8%) was a favorite Korean medicine, followed by medicinal treatment (8.1%), acupuncture (3.1%), moxibustion (3.0%), and cupping (2.1%). Conclusions: In Korea, one third of cancer patients are using Korean medicine. We need to know the expectations and demand for Korean medicine for treating cancer and establish our strategy to attract public attention.

미국 로스앤젤레스 지역 한인의 정보 추구 행태 (The Information Seeking Behavior of Koreans in the United States)

  • 윤정옥
    • 한국문헌정보학회지
    • /
    • 제25권
    • /
    • pp.389-413
    • /
    • 1993
  • This study was inspired by the growing importance of information as a resource for improving the quality of life, the lack of systematic research about the information environment of Koreans in the United States and the lack of understanding of the relationships between individual characteristics and information seeking behavior. During 1990 and 1991, 204 Koreans, 18 years old and more, residing in the City of Los Angeles, were interviewed. Generally the information seeking behavior of Koreans appeared to be similar to that of the socioeconomically advantaged segment of the general public. They are relatively well aware of their information needs. capable of articulating them, and willing to pursue information to meet their needs. Major findings include: (1) the dominance of educational information needs: (2) positive feelings of hope, curiosity. and interest associated with information needs: (3) the tendency to pursue information with the expectation of potential rather than immediate rewards: (4) the expertise of information sources and their ability to provide information directly relevant to a need as criteria for selecting an information source: (5) the generally heavy reliance on informal interpersonal information sources and the high ranking of professionals as the starting point for information seeking and in judgements of usefulness: and (6) the dominant use of Korean ethnic information sources. Statistically significant correlations found at the 0.05 level relate (1) level of education, age, and gender with type of information need, the feelings associated with an information need, motivations to seek information, and the use of information sources, (2) proficiency in English and length of residence in the United States with the extent to which ethnic information sources are used, and (3) pattern of daily use of media with the use of media in seeking information.

  • PDF

CIOS 몽고메리 모듈러 곱셈 알고리즘 기반 Scalable RSA 공개키 암호 프로세서 (Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm)

  • 조욱래;신경욱
    • 한국정보통신학회논문지
    • /
    • 제22권1호
    • /
    • pp.100-108
    • /
    • 2018
  • 512/1,024/2,048/3,072 비트의 4가지 키 길이를 지원하는 scalable RSA 공개키 암호 프로세서를 설계하였다. RSA 암호의 핵심 연산블록인 모듈러 곱셈기를 CIOS (Coarsely Integrated Operand Scanning) 몽고메리 모듈러 곱셈 알고리듬을 이용하여 32 비트 데이터 패스로 설계하였으며, 모듈러 지수승 연산은 Left-to-Right (L-R) 이진 멱승 알고리듬을 적용하여 구현하였다. 설계된 RSA 암호 프로세서를 Virtex-5 FPGA로 구현하여 하드웨어 동작을 검증하였으며, 512/1,024/2,048/3,072 비트의 키 길이에 대해 각각 456,051/3,496,347/26,011,947/88,112,770 클록 사이클이 소요된다. $0.18{\mu}m$ CMOS 표준셀 라이브러리를 사용하여 100 MHz 동작 주파수로 합성한 결과, 10,672 GE와 $6{\times}3,072$ 비트의 메모리로 구현되었다. 설계된 RSA 공개키 암호 프로세서는 최대 동작 주파수는 147 MHz로 예측되었으며, 키 길이에 따라 RSA 복호 연산에 3.1/23.8/177/599.4 ms 가 소요되는 것으로 평가되었다.