• Title/Summary/Keyword: Random number generation

Search Result 155, Processing Time 0.027 seconds

An LDPC Code Replication Scheme Suitable for Cloud Computing (클라우드 컴퓨팅에 적합한 LDPC 부호 복제 기법)

  • Kim, Se-Hoe;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.134-142
    • /
    • 2012
  • This paper analyze an LDPC code replication method suitable for cloud computing. First, we determine the number of blocks suitable for cloud computing through analysis of the performance for the file availability and storage overhead. Also we determine the type of LDPC code appropriate for cloud computing through the performance for three types of LDPC codes. Finally we present the graph random generation method and the comparing method of each generated LDPC code's performance by the iterative decoding process. By the simulation, we confirmed the best graph's regularity is left-regular or least left-regular. Also, we confirmed the best graph's total number of edges are minimum value or near the minimum value.

The Detection of Online Manipulated Reviews Using Machine Learning and GPT-3 (기계학습과 GPT3를 시용한 조작된 리뷰의 탐지)

  • Chernyaeva, Olga;Hong, Taeho
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.347-364
    • /
    • 2022
  • Fraudulent companies or sellers strategically manipulate reviews to influence customers' purchase decisions; therefore, the reliability of reviews has become crucial for customer decision-making. Since customers increasingly rely on online reviews to search for more detailed information about products or services before purchasing, many researchers focus on detecting manipulated reviews. However, the main problem in detecting manipulated reviews is the difficulties with obtaining data with manipulated reviews to utilize machine learning techniques with sufficient data. Also, the number of manipulated reviews is insufficient compared with the number of non-manipulated reviews, so the class imbalance problem occurs. The class with fewer examples is under-represented and can hamper a model's accuracy, so machine learning methods suffer from the class imbalance problem and solving the class imbalance problem is important to build an accurate model for detecting manipulated reviews. Thus, we propose an OpenAI-based reviews generation model to solve the manipulated reviews imbalance problem, thereby enhancing the accuracy of manipulated reviews detection. In this research, we applied the novel autoregressive language model - GPT-3 to generate reviews based on manipulated reviews. Moreover, we found that applying GPT-3 model for oversampling manipulated reviews can recover a satisfactory portion of performance losses and shows better performance in classification (logit, decision tree, neural networks) than traditional oversampling models such as random oversampling and SMOTE.

Guidelines for Safe and Reliable PUF Implementation (안전하고 신뢰성 있는 PUF 구현을 위한 가이드라인)

  • Lee, Donggeon;Lee, Yeonchoel;Kim, Kyunghoon;Park, Jong-Gyu;Choi, Yong-Je;Kim, Howon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.241-259
    • /
    • 2014
  • A PUF is a technology for distinguishing a device from other devices like biological information such as humans' iris or fingerprints. Over the past decade, many researchers studied various methods for implementing PUFs and utilizing them in identification, random number generation, key distribution and authentication. However, various attacks on the PUFs are the major reason to inhibiting the proliferation of PUF. For the reasons, various technologies are being studied to enhance safety of PUFs. In this paper, we will see several PUF implementations and various attacks on PUFs, and suggest guidelines for securely implementing PUFs. We expect our guidelines would be the foundation for implementing the secure and reliable PUFs.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Teens and College Students' Purchasing Decision Factors of Denim Jeans In the United States

  • Hwang Shin, Su-Jeong;Fowler, Deborah;Lee, Jinhee
    • Fashion & Textile Research Journal
    • /
    • v.15 no.6
    • /
    • pp.971-976
    • /
    • 2013
  • This study provides insight into current social media influences and purchasing power of the young generation in that the size of both of these demographic groups will impact the apparel companies and retail market for the predictable future Denim apparel companies are aware of the discretionary spending power of the Y and Z Generations. The characteristics of current teens are so similar to college-age individuals in that they have grown up with digital technology and they prefer to communicate via social networking sites. Retailers have utilized these social media platforms in order to capture the attention of the generations. Traditionally marketing campaigns have differentiated between teens and the college-age population. However, the teens actually have larger spending power and more discretionary income. A survey consisted of 32 questions pertaining to Internet media influences, influence of people, and decision factors on decisionmaking related to purchasing selection. A random sampling of 163 females responded to a set of questionnaires. Teens, like college students desire to make their own decisions when they select and purchase denim jeans. Overall 40% of them wanted to make their own decisions when purchasing their jeans, however, a significant number are influenced by their friend's opinions (34%) and the opinions of family members (15%). However, celebrities (10%) had the least influence on their decisions. Teens, like colleges students make decisions based on the same decision factors: fit (63%), cost (23%), brand (10%) and color (2%). The most important factor in determining preference was "fit".

The Research Trends on the Acupuncture Treatment of Lumbar Herniated Intervertebral Disc Using PubMed Database (PubMed 검색을 통한 요추 추간판 탈출증의 침치료 연구 동향)

  • Shin, Woo-Suk;Park, Won-Hyung;Cha, Yun-Yeop
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.24 no.4
    • /
    • pp.49-60
    • /
    • 2014
  • Objectives The purpose of this study is to research current trends of acupuncture treatment of lumbar herniated intervertebral disc using the PubMed database. Methods We set up the search strategy and investigated clinical trials on acupuncture treatment of lumbar herniated intervertebral disc through PubMed search. This study analyzed previous researched papers published from January 1st, 2000 to April 30th, 2014, and classified them by publication year, journal names, types of literature, treatment methods and evaluation scales. To assess the quality of the reviewed literature, randomized controlled trial (RCT) studies were assessed by Cochrane's risk of bias (ROB) tool and non-RCT studies were assessed by risk of bias for non-randomized studies (RoBANS). Results We found 35 studies on the acupuncture treatment of lumbar herniated intervertebral disc. Papers on this topic have been published, on average, three to four times annually in 9 journals since the mid-2000's. The journal with the largest number of publications was Chinese Acupuncture & Moxibustion, and most of articles were classified as RCT. Acupuncture treatment was performed individually or together with other treatments. The most frequently used pain evaluation index was visual analogue scale (VAS). The index of effective rate was used frequently but there was a lack of objectivity. In regards to the quality of the studies, outcome assessment in RCT showed that random sequence generation, allocation concealment, and the blinding of participants and personnel increase potential of risk of bias. For non-RCT assessment, outcome showed that confounding variable, measurement of intervention were at high risk of bias. Conclusions In order to obtain objective clinical evidence of acupuncture treatment of lumbar herniated intervertebral disc, further clinical studies should be designed to minimize the risk of bias, using STRICTA with larger sample sizes.

The Assessment of Risk of Bias on Clinical Trials of Korean Medicine for Alopecia (탈모증의 한약제제 임상연구에 대한 비뚤림 위험 평가)

  • Ryu, Deok-hyun;Roh, Seok-sun
    • Journal of Haehwa Medicine
    • /
    • v.24 no.1
    • /
    • pp.25-36
    • /
    • 2015
  • Objective : This study aims to evaluate a risk of bias by Risk of Bias tool and RoBANS(Risk of Bias Assessment tool for Non-randomized Study) tool for clinical trial papers proving treatment effect of herbs to alopecia and provides the newest reason of effectiveness of herbs to alopecia. Methos : Data were collected through electronic database including NDSL, KISS, KMBASE, Koreantk, OASIS, KoreaMed, KISTI, Pubmd, Cochrane CENTRAL and CINAHL. Two experts in Oriental Medince assessed risk of bias of randomized controlled trials by Cochrane group's Risk of Bias tool and non-randomized controlled trials by RoBANS tool after searching, reviewing and selecting papers. Results : Total number of selected trials is 20 including 4 randomized controlled trials, 13 non-randomized controlled trials and 3 case reports. This study evaluates the risk of bias of 17 papers including 4 randomized controlled trials and 13 non-randomized controlled trials except 3 case reports by risk of bias tool and RoBANS tool. All papers of randomized controlled trials are evaluated unclear for random sequence generation and allocation concealment as there are no word on them. And all papers of non-randomized controlled trials are evaluated unclear for blinding of outcome assessments and relatively low for others. Conclusion : We must try to specify concretely methods of allocation concealment after planning and practicing it for reducing a selection bias in randomized controlled trials. Also report a reason of missing value and blinding outcome assessments. And we have to agonize and mention methods of blinding of researchers for reducing a detection bias in non-randomized controlled trials.

  • PDF

Allozyme Variation and Population Structure of Carex okamotoi (Cyperaceae), a Korean Endemic Species (한국 내 국부적으로 분포하는 지리사초의 알로자임 변이와 집단구조)

  • Huh, Man-Kyu;Choi, Joo-Soo
    • Journal of Life Science
    • /
    • v.20 no.8
    • /
    • pp.1151-1158
    • /
    • 2010
  • The genetic diversity and population structures of fourteen Carex okamotoi (Cyperaceae) populations in Korea were determined using genetic variation at 25 allozyme loci. The Carex okamotoi species is native to Korea. It is endemic to three mountains (Mt. Taeback, Mt. Sobak, and Mt. Noreong) where it is found at 700~1,500 m above sea level. The percentage of polymorphic loci was 40.0%. Genetic diversity at the species level and at the population level was low ($H_{ES}$=0.106; $H_{EP}$=0.094), and the extent of the population divergence was relatively low ($G_{ST}$=0.082). Measurement of deviation from random mating ($F_{IS}$) within the 14 populations was 0.238. An indirect estimate of the number of migrants per generation was 2.78 (Nm=2.78). Analysis of fixation indices revealed a substantial heterozygosity deficiency in some populations and at some loci. Mean genetic identity between populations was 0.986.

Parameter Effect on Elastic Modulus of Discontinuity Rock-mass Based on Homogenization Method (균질화 이론에 근거한 불연속성 암반의 탄성계수에 영향을 미치는 불연속면의 조사 인자에 관한 연구)

  • Baek, Yong
    • Journal of the Korean Geotechnical Society
    • /
    • v.16 no.4
    • /
    • pp.63-70
    • /
    • 2000
  • The quantitative analyses and the mechanical interpretation of discontinuity planes are the most important factor for the study of strength and deformation properties of rock masses containing discontinuity planes. However, the relationship between the factors investigated in the field and the actual mechanical properties of discontinuity planes is not fully understood. The main purpose of this study is to investigate the effects of density, length, and spacing of joints on elastic modulus of rock masses as these values vary. A new parameter which has a direct relation with the elastic modulus of discontinuity planes is also preposed in this study. The combination of finite element methods and homogenization methods has been used for the numerical analyses of a uintcell with discontinuity planes, which is generated using random-number generation methods. The elastic modulus of the discontinuity plane is found from the numerical analyses. The final results propose not only the relation between the investigation parameters of discontinuity planes and the elastic modulus of rock masses but also a new parameter, an effect area ratio having a linear relation with the elastic modulus of rock masses.

  • PDF

A study on Kerberos Authentication and Key Exchange based on PKINIT (PKINIT기반의 Kerberos 인증과 키 교환에 관한 연구)

  • Sin, Gwang-Cheol;Jeong, Il-Yong;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.313-322
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Ggroup. Did to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/BNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos' symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. Excluded random number ($K_{rand}$) generation and duplex encryption progress to confirm Client. A Design of Kerberos system that have effect and simplification of certification formality that reduce Overload on communication.