• Title/Summary/Keyword: forward fifth polynomial method

Search Result 2, Processing Time 0.014 seconds

Application of Numerical Differentiation in Structural Analyses of Arch Structures (아치구조물의 구조해석에서 수치미분의 적용)

  • Lee, Byoung-Koo;Kim, Suk-Ki;Lee, Tae-Eun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.19 no.4 s.74
    • /
    • pp.441-447
    • /
    • 2006
  • This paper deals with the application of the numerical differentiation in the structural analyses. Derivative values of the geometry of structure are definitely needed for analysing the structural behavior. In this study, free vibration problems of arches are chosen for verifying the numerical differential technique in the structural analyses. The curvature parameters composed with the derivatives of arch geometry obtained herein are quite agreed with those of analytical method. Also, natural frequencies with curvature parameters obtained by using the forward fifth polynomial method are quite agreed with those in the literature. The numerical differentiation technique can be practically utilized in the structural analyses.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.