• Title/Summary/Keyword: mutual information analysis

Search Result 488, Processing Time 0.02 seconds

Mutual Information Analysis with Similarity Measure

  • Wang, Hong-Mei;Lee, Sang-Hyuk
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.218-223
    • /
    • 2010
  • Discussion and analysis about relative mutual information has been carried out through fuzzy entropy and similarity measure. Fuzzy relative mutual information measure (FRIM) plays an important part as a measure of information shared between two fuzzy pattern vectors. This FRIM is analyzed and explained through similarity measure between two fuzzy sets. Furthermore, comparison between two measures is also carried out.

Mutual information analysis of EEG in stimuli of odors (향 자극에 대한 뇌파의 상호 정보량 분석)

  • 민병찬;강인형;최지연;정순철;김철중
    • Science of Emotion and Sensibility
    • /
    • v.6 no.2
    • /
    • pp.17-20
    • /
    • 2003
  • The present study analyzed and compared the mutual information obtained by stimulating saleswomen with 6 natural fragrances 100% basil oil, Lavender oil, lemon oil, jasmine oil, ylang-ylang oil (KIMEX Co., Ltd.), and skatole. When stimulated with basil and skatole, which were less favored fragrances, the women produced a greater amount of mutual information than when not stimulated with any fragrance. In addition, a comparison among the effects of the fragrances revealed that the subjects tended to produce more mutual information regarding less favored fragrances than regarding more favored ones. This is because the amount of mutual information in the cerebrum is linked to the women's preference regarding fragrances. Consequently, less favored fragrances have been demonstrated clearly to produce more mutual information among the subjects.

  • PDF

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.

The Effect of Organizational Relations and Technology Factors on Logistics Performance of Logistics Firms (물류기업의 조직간 관계요인 및 기술요인이 물류성과에 미치는 영향)

  • Yi, Seon Gyu
    • Journal of Service Research and Studies
    • /
    • v.7 no.1
    • /
    • pp.41-52
    • /
    • 2017
  • This study The purpose of this study is to analyze the effect of relationship factors and technical factors on the logistics performance of logistics companies. As a result of the analysis, information sharing, mutual trust, and mutual benefit of the inter-organizational relationship factors as factors affecting the logistics performance were analyzed as the factors that positively influence the logistics performance. In the technology factor, IT infrastructure and technology reliability are analyzed as factors that positively influence logistics performance, but system operation capacity is analyzed as a factor that does not positively affect logistics performance. Based on the results of this analysis, it can be confirmed that logistics companies can maximize the logistics performance by mutual sharing of information, mutual benefit and trust, and it is also confirmed that technical reliability is also an important factor.

Mutual Coupling Compensation and Direction Finding for Anti-Jamming 3D GPS Antenna Array (항재밍 3차원 GPS 배열 안테나를 위한 Mutual coupling 보상 및 재밍 방향탐지 알고리즘)

  • Kang, Kyusic;Sin, Cheonsig;Kim, Sunwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.723-730
    • /
    • 2017
  • In this paper, we consider an online compensation algorithm considering the mutual coupling and suggest a new GPS antenna array to apply. To evaluate the anti-jamming performance for the proposed antenna array, ULA and URA, we divide direction finding of multiple jamming signals into environments. 1. there is no mutual coupling. 2. there is mutual coupling but no compensation. 3. mutual coupling is compensated. RMSE analysis showed that the online compensation algorithm works and that peak detection is possible for multiple jamming signals.

Improved An RFID Mutual Authentication Protocol Based on Hash Function (개선된 해시기반의 RFID 상호인증 프로토콜)

  • Shin, Ju-Seok;Oh, Se-Jin;Jeong, Cheol-Ho;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.241-250
    • /
    • 2012
  • In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.

A Method Finding Representative Questionare for Mutual Information and Entropy (상호정보와 엔트로피를 활용한 대표문항 선택방법)

  • Choi, Byong-Su;Kim, Hyun-Ji
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.4
    • /
    • pp.591-598
    • /
    • 2010
  • A questionnaire may consist of duplicated or similar items. This study finds the duplicated or similar items by using the MDS and the cluster analysis of response patterns. By identifying the characteristics of the cluster, those items are combined into a representative item. The similarity of items is measured by the mutual information.

Input Variable Selection by Principal Component Analysis and Mutual Information Estimation (주요성분분석과 상호정보 추정에 의한 입력변수선택)

  • Jo, Yong-Hyeon;Hong, Seong-Jun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.175-178
    • /
    • 2006
  • 본 논문에서는 주요성분분석과 상호정보 추정을 조합한 입력변수선택 기법을 제안하였다. 여기서 주요성분분석은 2차원 통계성을 이용하여 입력변수 간의 독립성을 찾기 위함이고, 상호정보의 추정은 적응적 분할을 이용하여 입력변수의 확률밀도함수를 계산함으로써 변수상호간의 종속성을 좀더 정확하게 측정하기 위함이다. 제안된 기법을 인위적으로 제시된 각 500개의 샘플을 가지는 6개의 독립신호와 1개의 종속신호를 대상으로 실험한 결과, 빠르고 정확한 변수의 선택이 이루어짐을 확인하였다.

  • PDF

기술협력과 정보관리정책의 상관관계에 관한 고찰 -한.러 및 한.중 과학기술협력을 중심으로-

  • 곽동철
    • Journal of Korean Library and Information Science Society
    • /
    • v.27
    • /
    • pp.97-136
    • /
    • 1997
  • Korea has good mutual relations with Russia and China in many fields, not just in science and technology, but also in trade. That is, it stands on a point of time in which an epoch-making turning point for mutual interests could be realized depending on how to join Russia's high technology with Korea's industrial technology with capital, or how to connect Korean -Chinese mutual concern and each other's advanced technology. The purpose of this study is to present scientific and technical information management policy for efficient su n.0, pport for technical cooperation with Russia and China. Bearing this purpose in mind, the concept of technical cooperation along with scientific and technical information management policy was closely examined. The correlation between the progress of technology and the type of scientific and technical information was examined, while the flow of scientific and technical information accompanying technical cooperation was studied. The methodology adopted for this study includes document research, empirical analysis and fact-finding survey. For document research, the writer analyzed the contents of scientific and technical information managing operations and the types of information to be utilized in the course of technical cooperation by examining domestic and foreign documents on international technical cooperation. For empirical analysis, the contents of actual results of scientific and technical information managing operations for technical cooperation with Russia and China were put in order and analyzed, while contents of survey conducted by organizations related to these countries for technical cooperation were synthesized and examined for fact -finding survey.

  • PDF

A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.63-68
    • /
    • 2016
  • Recently, Biometrics is being magnified than ID or password about user authentication. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. As FIDO(Fast IDentity Online) than existing server storing method, It stores a user's biometric information to the user device. And the user device authentication using the user's biometric information, the user equipment has been used a method to notify only the authentication result to the server FIDO. However, FIDO has no mutual authentication between the user device and the FIDO server. We use a Certificate Authority in order to mutually authenticate the user and the FIDO server. Thereby, we propose a more reliable method and compared this paper with existed methods about security analysis.