• Title/Summary/Keyword: dN/dS

Search Result 5,599, Processing Time 0.04 seconds

Reliability of 3D-Inertia Measurement Unit Based Shoes in Gait Analysis (관성센서 기반 신발형 보행 분석기의 신뢰성 연구)

  • Joo, Ji-Yong;Kim, Young-Kwan;Park, Jae-Young
    • Korean Journal of Applied Biomechanics
    • /
    • v.25 no.1
    • /
    • pp.123-130
    • /
    • 2015
  • Purpose : The purpose of this study was to investigate the reliability of 3D-inertia measurement unit (IMU) based shoes in gait analysis. This was done with respect to the results of the optical motion capturing system and to collect reference gait data of healthy subjects with this device. Methods : The Smart Balance$^{(R)}$ system of 3D-IMU based shoes and Osprey$^{(R)}$ motion capturing cameras were used to collect motion data simultaneously. Forty four healthy subjects consisting of individuals in 20s (N=20), 40s (N=13), and 60s (N=11) participated in this study voluntarily. They performed natural walking on a treadmill for one minute at 4 different target speeds (3, 4, 5, 6 km/h), respectively. Results : Cadence (ICC=.998), step length (ICC=.970), stance phase (ICC=.845), and double-support phase (ICC=.684) from 3D-IMU based shoes were in agreement with results of optical motion system. Gait data of healthy subjects according to different treadmill speeds and ages were matched to previous literature showing increased cadence and reduced step length for elderly subjects. Conclusion : Conclusively, 3D-IMU based shoes in gait analysis were a satisfactory alternative option in measuring linear gait parameters.

Andreev reflection in metal- and ferromagnet-d-wave superconductor tunnel Junction

  • Kim, Sun-Mi;Hwang, Yun-Seok;Cha, Deok-Joon;Lee, Kie-Jin
    • 한국초전도학회:학술대회논문집
    • /
    • v.10
    • /
    • pp.141-144
    • /
    • 2000
  • We report on the influence of d-wave pairing symmetry in high-T$_c$ superconductor by tunneling spectroscopy. The zerobias conductance peak(ZBCP) which is produced by tunneling through the ab-plane is observed on both of metal Au/YBa$_2$Cu$_3$O$_y$(N/S) tunnel junctions and ferromagnet Co/Au/ YBa$_2$Cu$_3$O$_y$(F/N/S) tunnel junctions. The effects of Andreev reflection on the differential conductance of each junctions are dependent on the tunnel direction. For the S/N/F junction, it appears the suppression of the ZBCP due to the suppression of Andreev reflection at the interface between a ferromagnetic material and a d-wave superconductor. By comparing these experimental results with recent theoretical works on Andreev reflection, the existence of Andreev bound state is verified in high-T$_c$ superconductor, due to the d-wave symmetry of the pair potential.

  • PDF

Partial Key Exposure Attack on Unbalanced RSA with small CRT exponent (작은 CRT 지수를 사용한 RSA에서의 일부 키 노출 공격)

  • 이희정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.135-140
    • /
    • 2004
  • In Crypto 2002 May analyzed the relation between the size of two primes and private key in unbalanced RSA with small CRT exponent. Also in Crypto 2003 he showed that if $N^{1}$4/ amount of most significant bits(least significant bits) of $d_{p}$ is exposed in balanced RSA with CRT, N can be factored. To prove this he used Howgrave-Graham's Theorem. In this paper we show that if $N^{1}$4/ amount of $d_{p}$ , p is smaller than q, and bigger than $N^{0.382}$ to avoid May's attack, is exposed in unbalanced RSA with small CRT exponent, it is enough to expose $d_{p}$ . We use Coppersmith's theorem with unbalanced primes.

Investigation of Research Trends in the D(Data)·N(Network)·A(A.I) Field Using the Dynamic Topic Model (다이나믹 토픽 모델을 활용한 D(Data)·N(Network)·A(A.I) 중심의 연구동향 분석)

  • Wo, Chang Woo;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.21-29
    • /
    • 2020
  • The Topic Modeling research, the methodology for deduction keyword within literature, has become active with the explosion of data from digital society transition. The research objective is to investigate research trends in D.N.A.(Data, Network, Artificial Intelligence) field using DTM(Dynamic Topic Model). DTM model was applied to the 1,519 of research projects with SW·A.I technology classifications among ICT(Information and Communication Technology) field projects between 6 years(2015~2020). As a result, technology keyword for D.N.A. field; Big data, Cloud, Artificial Intelligence, extended keyword; Unstructured, Edge Computing, Learning, Recognition was appeared every year, and accordingly that the above technology is being researched inclusively from other projects can be inferred. Finally, it is expected that the result from this paper become useful for future policy·R&D planning and corporation's technology·marketing strategy.

The Effect of Delamination Shape Factor, $f_s$ on the Delamination Growth Rate, $dA_D/da$ in FRMLs (층간분리 형상계수($F_s$)가 FRMLs의 층간분리 성장률($dA_D/da$)에 미치는 영향)

  • 송삼홍;이원평;김광래;김철웅
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2003.04a
    • /
    • pp.398-404
    • /
    • 2003
  • Most previous researches for the hybrid composite materials such as FRMLs(Al/AFRP, Al/GFRP) have evaluated the fatigue delamination behavior using the traditional fracture mechanism. However, most previous researches have not generally been firmed yet. Because delamination growth behavior in hybrid composite should be consider delamination growth rate, $dA_D$/da using the delamination shape factors, fs instead of traditional fracture mechanic parameters. The major purpose of this study was to evaluate the relationship between delamination shape factor, fs and delamination growth rate, $dA_D$ . And a propose parameter on the delamination aspect ratio, b/a. The details of the study are as follow : 1) Relationship between crack length, a and delamination width,b. 2) Relationship between delamination aspect ration, b/a and delamination area rate,($(A_D)_{N}(A_D)_{ALL}$. 3) Variation of delamination growth rate, $dA_D/da$ was attendant on delamination shape factors, $fs_1$, $fs_2$, $fs_3$. The test results indicated the delamination growth rate depends on delamination shape factors.

  • PDF

Algebraic Analysis for Partitioning Root and Stem Lodging in Rice Plant

  • Chang, Jae-Ki;Yeo, Un-Sang;Lee, Jeom-Sig;Oh, Byong-Geun;Kim, Jeong-Il;Yang, Sae-Jun;Ku, Yeon-Chung;Kim, Ho-Yeong;Sohn, Jae-Keun
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.51 no.6
    • /
    • pp.539-543
    • /
    • 2006
  • Lodging is classified as root lodging caused by the loss of supporting force in the root, bending caused by the deformation of the stem and breaking where the stem breaks down as loads exceeding critical elasticity were applied. This research excluded breaking which is not in a state of equilibrium and tried to partition the level of lodging using an algebraic model in root lodging and stem lodging, or bending. When a vertical load was applied, the deformation of the stem of rice plant showed the form of a quadratic equation. The trace of the panicle neck in the process of lodging was an ellipse-shape. When loading was pure root lodging, the trace of the panicle neck became a circle of which culm length is the radius. When it was a pure stem lodging, the trace of the panicle neck is an ellipse of which major axis is culm length and minor axis is 0.64* culm length. When both stem lodging and root lodging occurred in a natural setting, the partitioning of lodging can be calculated by a formula using eccentricity of an ellipse, S=e*100/0.768(S is the ratio of stem lodging in the whole lodging, e is eccentricity of the ellipse). This method is expected to be useful in simple lodging partitioning. We could also calculate the partitioning of stem lodging and root lodging as units of angles as an accuracy method, by using a straight line calculated by differentiating a quadratic equation of stem deformation at the origin of the coordinates. These two methods for dividing root and stem lodging showed different values. However, each of them showed almost same values with different lodging degree in one plant.

The Improved Estimation of the Least Upper Bound to Search for RSA's Private key

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2074-2093
    • /
    • 2022
  • RSA is known as one of the best techniques for securing secret information across an unsecured network. The private key which is one of private parameters is the aim for attackers. However, it is exceedingly impossible to derive this value without disclosing all unknown parameters. In fact, many methods to recover the private key were proposed, the performance of each algorithm is acceptable for the different cases. For example, Wiener's attack is extremely efficient when the private key is very small. On the other hand, Fermat's factoring can quickly break RSA when the difference between two large prime factors of the modulus is relatively small. In general, if all private parameters are not disclosed, attackers will be able to confirm that the private key is unquestionably inside the scope [3, n - 2], where n is the modulus. However, this scope has already been reduced by increasing the greatest lower bound to [dil, n - 2], where dil ≥ 3. The aim of this paper is to decrease the least upper bound to narrow the scope that the private key will remain within this boundary. After finishing the proposed method, the new scope of the private key can be allocated as [dil, dir], where dir ≤ n - 2. In fact, if the private key is extremely close to the new greatest lower bound, it can be retrieved quickly by performing a brute force attack, in which dir is decreased until it is equal to the private key. The experimental results indicate that the proposed method is extremely effective when the difference between prime factors is close to each other and one of two following requirement holds: the first condition is that the multiplier of Euler totient function is very close to the public key's small value whereas the second condition is that the public key should be large whenever the multiplier is far enough.

A Study on the Performance Improvement of Turbo Coded OFDM Systems Considering Frequency Offset (주파수 오프셋을 고려한 Tued OFDM 시스템의 성능 개선에 관한 연구)

  • 이영춘;박기식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.908-915
    • /
    • 2001
  • In this paper, it is analyzed theoretically that the performance degradation, caused by carrier frequency offset, in an OFDM/M-ary PSK system. Then, when Turbo coding is adopted to an OFDM/M-ary PSK system, the degree of performance enhancement is evaluated. Finally, the maximum frequency offset is calculated to satisfy the BER performance required in a Turbo coded OFDM/M-ary PSK system. As results of analysis, it is shown that the more the number of M-ary is, the worse the BER performance is. Moreover, 7dB, 9dB, and 17dB of $E_b/N_o$ are required in QPSK, 8PSK and 16PSK systems, respectively in order to satisfy the error performance, $BER=10^{-3}$ for voice communication. If $E_b/N_o$ are 10㏈ and 15㏈, the frequency offset should be below 0.05 and 0.075, respectively, for voice communication. When Turbo coding is adopted to an OFDM/M-ary PSK system, the less the number of M-ary is, the greater the performance enhancement of Turbo coding is. If the number of a M-ary system of the system is below 16, it is found that required $E_b/N_o$ is about 8dB to satisfy $BER=10^{-5}$ Moreover, in the system the Turbo coding scheme, voice communication is available with greatly low$E_b/N_o$, and 8dB of $E_b/N_o$ is enough for data communication regardless of the permission range of frequency offset.

  • PDF