• Title/Summary/Keyword: Theoretical Computation

Search Result 198, Processing Time 0.022 seconds

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

On the elastic stability and free vibration responses of functionally graded porous beams resting on Winkler-Pasternak foundations via finite element computation

  • Zakaria Belabed;Abdelouahed Tounsi;Mohammed A. Al-Osta;Abdeldjebbar Tounsi;Hoang-Le Minh
    • Geomechanics and Engineering
    • /
    • v.36 no.2
    • /
    • pp.183-204
    • /
    • 2024
  • In current investigation, a novel beam finite element model is formulated to analyze the buckling and free vibration responses of functionally graded porous beams resting on Winkler-Pasternak elastic foundations. The novelty lies in the formulation of a simplified finite element model with only three degrees of freedom per node, integrating both C0 and C1 continuity requirements according to Lagrange and Hermite interpolations, respectively, in isoparametric coordinate while emphasizing the impact of z-coordinate-dependent porosity on vibration and buckling responses. The proposed model has been validated and demonstrating high accuracy when compared to previously published solutions. A detailed parametric examination is performed, highlighting the influence of porosity distribution, foundation parameters, slenderness ratio, and boundary conditions. Unlike existing numerical techniques, the proposed element achieves a high rate of convergence with reduced computational complexity. Additionally, the model's adaptability to various mechanical problems and structural geometries is showcased through the numerical evaluation of elastic foundations, with results in strong agreement with the theoretical formulation. In light of the findings, porosity significantly affects the mechanical integrity of FGP beams on elastic foundations, with the advanced beam element offering a stable, efficient model for future research and this in-depth investigation enriches porous structure simulations in a field with limited current research, necessitating additional exploration and investigation.

Development and Application of Diffusion Wave-based Distributed Runoff Model (확산파에 기초한 분포형 유출모형의 개발 및 적용)

  • Lee, Min-Ho;Yoo, Dong-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.7
    • /
    • pp.553-563
    • /
    • 2011
  • According to the improvement of computer's performance, the development of Geographic Information System (GIS), and the activation of offering information, a distributed model for analyzing runoff has been studied a lot in recently years. The distribution model is a theoretical and physical model computing runoff as making target basin subdivided parted. In the distributed model developed by this study, the volume of runoff at the surface flow is calculated on the basis of the parameter determined by landcover data and a two-dimensional diffusion wave equation. Most of existing runoff models compute velocity and discharge of flow by applying Manning-Strickler's mean velocity equation and Manning's roughness coefficient. Manning's roughness coefficient is not matched with dimension and ambiguous at computation; Nevertheless, it is widely used in because of its convenience for use. In order to improve those problems, this study developed the runoff model by applying not only Manning-Strickler's equation but also Chezy's mean velocity equation. Furthermore, this study introduced a power law of exponential friction factor expressed by the function of roughness height. The distributed model developed in this study is applied to 6 events of fan-shape basin, oblong shape test basin and Anseongcheon basin as real field conditions. As a result the model is found to be excellent in comparison with the exiting runoff models using for practical engineering application.

Study on the Meaning of Four Subjects and Four Species as a Disease-Prediction Data and Diagnostic Value on Ante-Disease (질병예측자료로서 사과(四科) . 사류형상(四類形象)의 의의와 미병진단적 가치 연구)

  • Kim, Jong-Won;Jeon, Soo-Hyung;Lee, In-Seon;Kim, Kyu-Kon;Lee, Yong-Tae;Kim, Kyung-Chul;Eom, Hyun-Sup;Chi, Gyoo-Yong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.23 no.2
    • /
    • pp.325-330
    • /
    • 2009
  • In Korea, medical diagnostic equipments and biochemical examination can not be used in order for diagnosing sub-healthy state or ante-disease state in oriental medicine clinic. So morphic analogical method used in oriental medicine can be a good tool as a disease-predictable signs in order to enable preventive diagnosis and therapy. Therefore the four geometrical subjects; Essence, Pneuma, Spirit, Blood(四科;精氣紳血) and the four taxonomical species; Pisces, Quadruped, Aves, Carapaces(四類;魚走鳥甲) are chosen as morphic models in this paper. The differences of two classifying methods with four subjects and four species were as follows. The diagnostic category was meta-medical and synthetic against medical specific. The diagnostic object was body in contrast with face. They were able to be applicant in psychology and classification of characteristics against diagnostics and therapeutics directly in oriental medicine. The theoretical basis was basic diagrams of four unit-fluids of body and morphological analogy with four animal species respectively. And the therapeutic aims were systemic pathogenesis following five phase theory against congestion and deficiency of Essence, Pneuma, Spirit, Blood. The four subjects and four species are mixed each other practically in clinic. But it should be used limitedly because of the above reasons described and must divide the principal and secondary factors and follow the pathology of principal shape factor. In order to improve the diagnostic value of ante-disease state, the discriminable standards, measurement methods, limit of interrelating interpretation and the criteria of abnormal disproportion were needed to be defined more clearly in advance.

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

Theoretical analysis of erosion degradation and safety assessment of submarine shield tunnel segment based on ion erosion

  • Xiaohan Zhou;Yangyang Yang;Zhongping Yang;Sijin Liu;Hao Wang;Weifeng Zhou
    • Geomechanics and Engineering
    • /
    • v.37 no.6
    • /
    • pp.599-614
    • /
    • 2024
  • To evaluate the safety status of deteriorated segments in a submarine shield tunnel during its service life, a seepage model was established based on a cross-sea shield tunnel project. This model was used to study the migration patterns of erosive ions within the shield segments. Based on these laws, the degree of deterioration of the segments was determined. Using the derived analytical solution, the internal forces within the segments were calculated. Lastly, by applying the formula for calculating safety factors, the variation trends in the safety factors of segments with different degrees of deterioration were obtained. The findings demonstrate that corrosive seawater presents the evolution characteristics of continuous seepage from the outside to the inside of the tunnel. The nearby seepage field shows locally concentrated characteristics when there is leakage at the joint, which causes the seepage field's depth and scope to significantly increase. The chlorine ion content decreases gradually with the increase of the distance from the outer surface of the tunnel. The penetration of erosion ions in the segment is facilitated by the presence of water pressure. The ion content of the entire ring segment lining structure is related in the following order: vault < haunch < springing. The difference in the segment's rate of increase in chlorine ion content decreases as service time increases. Based on the analytical solution calculation, the segment's safety factor drops more when the joint leaks than when its intact, and the change rate between the two states exhibits a general downward trend. The safety factor shows a similar change rule at different water depths and continuously decreases at the same segment position as the water depth increases. The three phases of "sudden drop-rise-stability" are represented by a "spoon-shaped" change rule on the safety factor's change curve. The issue of the poor applicability of indicators in earlier studies is resolved by the analytical solution, which only requires determining the loss degree of the segment lining's effective bearing thickness to calculate the safety factor of any cross-section of the shield tunnel. The analytical solution's computation results, however, have some safety margins and are cautious. The process of establishing the evaluation model indicates that the secondary lining made of molded concrete can also have its safety status assessed using the analytical solution. It is very important for the safe operation of the tunnel and the safety of people's property and has a wide range of applications.

A Study on the Shape and Movement in Dissolved Air Flotation for the Algae Removal (수중조류제거(水中藻類除去)를 위한 가압부상(加壓浮上)에 있어서 기포(氣泡)의 양태(模態)에 관한 연구(研究))

  • Kim, Hwan Gi;Jeong, Tae Seop
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.4 no.4
    • /
    • pp.79-93
    • /
    • 1984
  • The dissolved air flotation(DAF) has been shown to be efficient process for the removal of algae ftom water. The efficiency of DAF can be affected by the volume ratio of pressurized liquid to sample, the pressure pressurized liquid, the contact time, the appropriate coagulant and its amount, the water temperature, the turbulence of reactor, the bubble size and rising velocity etc. The purpose of this paper is to compare the practical bubble rising velocity with the theoretical one, to investigate the adhesion phenomenon of bubbles and floc, and the influence of bubble size and velocity upon the process. The results through theoretical review and experimental investigation are as follows: Ives' equation is more suitable than Stokes' equation in computation of the bubble rising velocity. The collection of bubble and algae floc is convective collection type and resulted from absorption than adhesion or collision. The treatment efficiency is excellent when the bubble sizes are smaller than $l00{\mu}m$, and the turbulence of reactor is small. In the optimum condition of continuous type DAF the volume ratio of pressurized liquid to sample is 15%, the contact time in reactor is 15 minutes, the pressure of pressurized liquid is $4kg/cm^2$ and the distance from jet needle to inlet is 30cm.

  • PDF

Resolving the 'Gray sheep' Problem Using Social Network Analysis (SNA) in Collaborative Filtering (CF) Recommender Systems (소셜 네트워크 분석 기법을 활용한 협업필터링의 특이취향 사용자(Gray Sheep) 문제 해결)

  • Kim, Minsung;Im, Il
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.137-148
    • /
    • 2014
  • Recommender system has become one of the most important technologies in e-commerce in these days. The ultimate reason to shop online, for many consumers, is to reduce the efforts for information search and purchase. Recommender system is a key technology to serve these needs. Many of the past studies about recommender systems have been devoted to developing and improving recommendation algorithms and collaborative filtering (CF) is known to be the most successful one. Despite its success, however, CF has several shortcomings such as cold-start, sparsity, gray sheep problems. In order to be able to generate recommendations, ordinary CF algorithms require evaluations or preference information directly from users. For new users who do not have any evaluations or preference information, therefore, CF cannot come up with recommendations (Cold-star problem). As the numbers of products and customers increase, the scale of the data increases exponentially and most of the data cells are empty. This sparse dataset makes computation for recommendation extremely hard (Sparsity problem). Since CF is based on the assumption that there are groups of users sharing common preferences or tastes, CF becomes inaccurate if there are many users with rare and unique tastes (Gray sheep problem). This study proposes a new algorithm that utilizes Social Network Analysis (SNA) techniques to resolve the gray sheep problem. We utilize 'degree centrality' in SNA to identify users with unique preferences (gray sheep). Degree centrality in SNA refers to the number of direct links to and from a node. In a network of users who are connected through common preferences or tastes, those with unique tastes have fewer links to other users (nodes) and they are isolated from other users. Therefore, gray sheep can be identified by calculating degree centrality of each node. We divide the dataset into two, gray sheep and others, based on the degree centrality of the users. Then, different similarity measures and recommendation methods are applied to these two datasets. More detail algorithm is as follows: Step 1: Convert the initial data which is a two-mode network (user to item) into an one-mode network (user to user). Step 2: Calculate degree centrality of each node and separate those nodes having degree centrality values lower than the pre-set threshold. The threshold value is determined by simulations such that the accuracy of CF for the remaining dataset is maximized. Step 3: Ordinary CF algorithm is applied to the remaining dataset. Step 4: Since the separated dataset consist of users with unique tastes, an ordinary CF algorithm cannot generate recommendations for them. A 'popular item' method is used to generate recommendations for these users. The F measures of the two datasets are weighted by the numbers of nodes and summed to be used as the final performance metric. In order to test performance improvement by this new algorithm, an empirical study was conducted using a publically available dataset - the MovieLens data by GroupLens research team. We used 100,000 evaluations by 943 users on 1,682 movies. The proposed algorithm was compared with an ordinary CF algorithm utilizing 'Best-N-neighbors' and 'Cosine' similarity method. The empirical results show that F measure was improved about 11% on average when the proposed algorithm was used

    . Past studies to improve CF performance typically used additional information other than users' evaluations such as demographic data. Some studies applied SNA techniques as a new similarity metric. This study is novel in that it used SNA to separate dataset. This study shows that performance of CF can be improved, without any additional information, when SNA techniques are used as proposed. This study has several theoretical and practical implications. This study empirically shows that the characteristics of dataset can affect the performance of CF recommender systems. This helps researchers understand factors affecting performance of CF. This study also opens a door for future studies in the area of applying SNA to CF to analyze characteristics of dataset. In practice, this study provides guidelines to improve performance of CF recommender systems with a simple modification.


  • (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.