• Title/Summary/Keyword: prime factors

Search Result 191, Processing Time 0.028 seconds

ALGEBRAIC ENTROPIES OF NATURAL NUMBERS WITH ONE OR TWO PRIME FACTORS

  • JEONG, SEUNGPIL;KIM, KYONG HOON;KIM, GWANGIL
    • The Pure and Applied Mathematics
    • /
    • v.23 no.3
    • /
    • pp.205-221
    • /
    • 2016
  • We formulate the additive entropy of a natural number in terms of the additive partition function, and show that its multiplicative entropy is directly related to the multiplicative partition function. We give a practical formula for the multiplicative entropy of natural numbers with two prime factors. We use this formula to analyze the comparative density of additive and multiplicative entropy, prove that this density converges to zero as the number tends to infinity, and empirically observe this asymptotic behavior.

$C^*$-ALGEBRAS ASSOCIATED WITH LENS SPACES

  • Boo, Deok-Hoon;Oh, Sei-Qwon;Park, Chun-Gil
    • Communications of the Korean Mathematical Society
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 1998
  • We define the rational lens algebra (equation omitted)(n) as the crossed product by an action of Z on C( $S^{2n+l}$). Assume the fibres are $M_{ k}$/(C). We prove that (equation omitted)(n) $M_{p}$ (C) is not isomorphic to C(Prim((equation omitted)(n))) $M_{kp}$ /(C) if k > 1, and that (equation omitted)(n) $M_{p{\infty}}$ is isomorphic to C(Prim((equation omitted)(n))) $M_{k}$ /(C) $M_{p{\infty}}$ if and only if the set of prime factors of k is a subset of the set of prime factors of p. It is moreover shown that if k > 1 then (equation omitted)(n) is not stably isomorphic to C(Prim(equation omitted)(n))) $M_{k}$ (c).

  • PDF

Variation of Determinant Factor for Seoul Metropolitan Area's Housing and Rent Price in Korea (수도권 주택가격 결정요인 변화 연구)

  • Lee, Kyung-Ae;Park, Sang-Hak;Kim, Yong-Soon
    • Land and Housing Review
    • /
    • v.4 no.1
    • /
    • pp.43-54
    • /
    • 2013
  • This This paper investigates the variation of the factors to determinate housing price in Seoul metropolitan area after sub-prime financial crisis, in Korea, using a VAR model. The model includes housing price and housing rent (Jeonse) in Seoul metropolitan area from 1999 to 2011, and uses interest rate, real GDP, KOSPI, Producer Price Index and practices to impulse response and variance decomposition analysis to grasp the dynamic relation between a variable of macro economy and and a variable of housing price. Data is classified to 2 groups before and after the 3rd quater of 2008, when sub-prime crisis occurred; one is from the 1st quater of 1999 to the 3rd quater of 2008, and the other is from the 2nd quater of 1999 and the 4th quater of 2011. As a result, comparing before and after sub-prime crisis, housing price is more influenced by its own variation or Jeonse price's variation instead of interest rate and KOSPI. Both before and after sub-prime financial crisis, Jeonse price is also influenced by its own variation and housing price. While after sub-prime financial crisis, influences of Producer Price Index, KOSPI and interest rate were weakened, influence of real GDP is expanded. As housing price and housing rent are more influenced by real economy factors such as GDP, its own variation than before sub-prime financial crisis, the recent trend that the house prices is declined is difficult to be converted, considering domestic economic recession and uncertainty, continued by Europe financial crisis. In the future to activate the housing business, it ia necessary to promote purchasing power rather than relaxation of financial and supply regulation.

A Study on the Consideration of the Locations of Gyeongju Oksan Gugok and Landscape Interpretation - Focusing on the Arbor of Lee, Jung-Eom's "Oksan Gugok" - (경주 옥산구곡(玉山九曲)의 위치비정과 경관해석 연구 - 이정엄의 「옥산구곡가」를 중심으로 -)

  • Peng, Hong-Xu;Kang, Tai-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.26-36
    • /
    • 2018
  • This study aims to examine the characteristics of landscape through the analysis of location and the landscape of Gugok while also conducting the empirical study through the literature review, field study, and digital analysis of the Okgung Gugok. Oksan Gugok is a set of songs set in Ogsan Creek(玉山川)or Jagyese Creek(紫溪川, 紫玉山), which flows in front of the Oksan Memorial Hall(李彦迪), which is dedicated to the Lee Eong-jeok (李彦迪). We first ascertained the location and configuration of Oksan Gogok. Second, we confirmed the accurate location of Oksan Gogok by utilizing the digital topographic map of Oksan Gogok which was submitted by Google Earth Pro and Geographic Information Center as well as the length of the longitude of the gravel measured by the Trimble Juno SB GPS. Through the study of the literature and the field investigation, The results of the study are as follows. First, Yi Eonjeok was not a direct composer of Oksan Gugok, nor did he produce "Oksan Gugokha(Music)". Lee Ia-sung(李野淳), the ninth Youngest Son of Tweo-Kye, Hwang Lee, visited the "Oksan Gugokha" in the spring of 1823(Sunjo 23), which was the 270th years after the reign of Yi Eonjeok. At this time, receiving the proposal of Ian Sung, Lee Jung-eom(李鼎儼), Lee Jung-gi(李鼎基), and Lee Jung-byeong(李鼎秉), the descendants of Ian Sung set up a song and created Oksan Gugok Music. And the Essay of Oksan Travel Companions writted by Lee Jung-gi turns out being a crucial data to describe the situation when setting up the Ok-San Gugok. Second, In the majority of cases, Gogok Forest is a forest managed by a Confucian Scholar, not run by ordinary people. The creation of "Oksan Bugok Music" can be regarded as an expression of pride that the descendants of Yi Eonjeok and Lee Hwang, and next generation of several Confucian scholars had inherited traditional Neo-Confucian. Third, Lee Jung-eom's "Oksan Donghaengki" contains a detailed description of the "Oksan Gugokha" process and the process of creating a song. Fourth, We examined the location of one to nine Oksan songs again. In particular, eight songs and nine songs were located at irregular intervals, and eight songs were identified as $36^{\circ}01^{\prime}08.60^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}31.20^{{\prime}{\prime}}E$. Referring to the ancient kingdom of Taojam, the nine-stringed Sainam was unbiased as a lower rock where the two valleys of the East West congregate. The location was estimated at $36^{\circ}01^{\prime}19.79^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}30.26^{{\prime}{\prime}}E$. Fifth, The landscape elements and landscapes presented in Lee Jung-eom's "Oksan Gugokha" were divided into form, semantic and climatic elements. As a result, Lee Jung-eom's Cho Young-gwan was able to see the ideal of mountain water and the feeling of being idle in nature as well as the sense of freedom. Sixth, After examining the appearance of the elements and the frequency of the appearance of the landscape, 'water' and 'mountain' were the absolute factors that emphasized the original curved environment at the mouth of Lee Jung-eom. Therefore, there was gugokga can gauge the fresh ideas(神仙思想)and retreat ever(隱居思想). This inherent harmony between the landscape as well as through the mulah any ideas that one with nature and meditation, Confucian tube.

The Improved Estimation of the Least Upper Bound to Search for RSA's Private key

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2074-2093
    • /
    • 2022
  • RSA is known as one of the best techniques for securing secret information across an unsecured network. The private key which is one of private parameters is the aim for attackers. However, it is exceedingly impossible to derive this value without disclosing all unknown parameters. In fact, many methods to recover the private key were proposed, the performance of each algorithm is acceptable for the different cases. For example, Wiener's attack is extremely efficient when the private key is very small. On the other hand, Fermat's factoring can quickly break RSA when the difference between two large prime factors of the modulus is relatively small. In general, if all private parameters are not disclosed, attackers will be able to confirm that the private key is unquestionably inside the scope [3, n - 2], where n is the modulus. However, this scope has already been reduced by increasing the greatest lower bound to [dil, n - 2], where dil ≥ 3. The aim of this paper is to decrease the least upper bound to narrow the scope that the private key will remain within this boundary. After finishing the proposed method, the new scope of the private key can be allocated as [dil, dir], where dir ≤ n - 2. In fact, if the private key is extremely close to the new greatest lower bound, it can be retrieved quickly by performing a brute force attack, in which dir is decreased until it is equal to the private key. The experimental results indicate that the proposed method is extremely effective when the difference between prime factors is close to each other and one of two following requirement holds: the first condition is that the multiplier of Euler totient function is very close to the public key's small value whereas the second condition is that the public key should be large whenever the multiplier is far enough.

Effects of Association and Imagery on Word Recognition (단어재인에 미치는 연상과 심상성의 영향)

  • Kim, Min-Jung;Lee, Seung-Bok;Jung, Bum-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.3
    • /
    • pp.243-274
    • /
    • 2009
  • The association, word frequency and imagery have been considered as the main factors that affect the word recognition. The present study aimed to examine the imagery effect and the interaction of the association effect while controlling the frequency effect. To explain the imagery effect, we compared the two theories (dual-coding theory, context availability model). The lexical decision task using priming paradigm was administered. The duration of prime words was manipulated as 20ms, 50ms, and 450ms in experiments 1, 2, and 3, respectively. The association and imagery of prime words were manipulated as the main factors in each of the three experiments. In experiment 1, the duration of prime words (20ms) which is expected to not activate the semantic context enough to affects the word recognition was used. As a result, only imagery effect was statically significant. In experiment 2, the duration of prime word was 50ms, which we expected to activate the semantic context without perceptual awareness. The result showed both the association and imagery effects. The interaction between the two effects was also significant. In experiment 3, to activate the semantic context with perceptual awareness, the prime words were presented for 450ms. Only association effect was statically significant in this experimental condition. The results of the three experiments suggest that the influence of the imagery was at the early stages of word recognition, while the association effect appeared rather later than the imagery. These results implied that the two theories are not contrary to each other. The dual-coding theory just concerned imagery effect which affects the early stage of word recognition, and context-availability model is more for the semantic context effect which affects rather later stage of word recognition. To explain the word recognition process more completely, some integrated model need to be developed considering not only the main 3 effects but also the stages which extends along the time course of the process.

  • PDF

Inhibitory effect of ethanolic extract of Abeliophyllum distichum leaf on 3T3-L1 adipocyte differentiation

  • Thomas, Shalom Sara;Eom, Ji;Sung, Nak-Yun;Kim, Dong-Sub;Cha, Youn-Soo;Kim, Kyung-Ah
    • Nutrition Research and Practice
    • /
    • v.15 no.5
    • /
    • pp.555-567
    • /
    • 2021
  • BACKGROUND/OBJECTIVES: Abeliophyllum distichum is a plant endemic to Korea, containing several beneficial natural compounds. This study investigated the effect of A. distichum leaf extract (ALE) on adipocyte differentiation. MATERIALS/METHODS: The cytotoxic effect of ALE was analyzed using cell viability assay. 3T3-L1 preadipocytes were differentiated using induction media in the presence or absence of ALE. Lipid accumulation was confirmed using Oil Red O staining. The mRNA expression of adipogenic markers was measured using RT-PCR, and the protein expressions of mitogen-activated protein kinase (MAPK) and peroxisome proliferator-activated receptor gamma (PPAR𝛾) were measured using western blot. Cell proliferation was measured by calculating the incorporation of Bromodeoxyuridine (BrdU) into DNA. RESULTS: ALE reduced lipid accumulation in differentiated adipocytes, as indicated by Oil Red O staining and triglyceride assays. Treatment with ALE decreased the gene expression of adipogenic markers such as Ppar𝛾, CCAAT/enhancer binding protein alpha (C/ebp𝛼), lipoprotein lipase, adipocyte protein-2, acetyl-CoA carboxylase, and fatty acid synthase. Also, the protein expression of PPAR𝛄 was reduced by ALE. Treating the cells with ALE at different time points revealed that the inhibitory effect of ALE on adipogenesis is higher in the early period treatment than in the terminal period. Furthermore, ALE inhibited adipocyte differentiation by reducing the early phase of adipogenesis and mitotic clonal expansion. This was indicated by the lower number of cells in the Synthesis phase of the cell cycle (labeled using BrdU assay) and a decrease in the expression of early adipogenic transcription factors such as C/ebp𝛽 and C/ebp𝛿. ALE suppressed the phosphorylation of MAPK, confirming that the effect of ALE was through the suppression of early phase of adipogenesis. CONCLUSIONS: Altogether, the results of the present study revealed that ALE inhibits lipid accumulation and may be a potential agent for managing obesity.

PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS

  • Sarkar, Santanu;Maitra, Subhamoy
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.721-741
    • /
    • 2009
  • Consider RSA with N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. We first study cryptanalysis of RSA when certain amount of the Most Significant Bits (MSBs) or Least Significant Bits (LSBs) of d is known. The basic lattice based technique is similar to that of Ernst et al. in Eurocrypt 2005. However, our idea of guessing a few MSBs of the secret prime p substantially reduces the requirement of MSBs or LSBs of d for the key exposure attack. Further, we consider the RSA variant proposed by Sun and Yang in PKC 2005 and show that the partial key exposure attack works significantly on this variant.