• 제목/요약/키워드: round

검색결과 5,152건 처리시간 0.035초

A study of the round Variation Design Brassiere Pattern

  • Park, You-Shin;Choi, Yeong-Soon
    • 패션비즈니스
    • /
    • 제12권6호
    • /
    • pp.81-92
    • /
    • 2008
  • The purpose of this study is to develop the applied brassiere pattern of women which are fitting for 75A. The constructing of this experimental brassiere were lower cup, upper cup, front panel and U-wing as well as a full cup embcing the entire breasts. Basing on the bra model from domestic experiment results, development of an applied design, round side type pattern, has been suggested. Thus, suggesting the round variation design bra, which is an applied design based on the basic model based on the breast volume. Based on the sizes that are in reference to Size Korea (2004) and related previous researches, the basic model that has been experimented with 11.4% polyurethane and 88.6% Nylon as the materials, has been selected as the model of research. This takes 75A, the size of which is set according to the underbust circumference and the breasts circumference, as the basic model. It is an application in terms of design, and there is no change to the cup volume or size because it has been moved only from the cutting line. The applied design changes the right side of the lower cup into an easily-movable form and attaches it to the upper cup, and the lower cup takes the right part of the upper cup to form a cup shape of round variation design. It also changes basic straight form of the wings, and alters them into U-shape.

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

  • Cui, Jingyi;Guo, Jiansheng;Huang, Yanyan;Liu, Yipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2660-2679
    • /
    • 2017
  • Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized ${\delta}-sets$. With the usage of a generalized ${\delta}-set$ and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.

단방향 지연 변이와 일주 지연을 이용한 양단간의 단방향 지연 추정 (One-Way Delay Estimation Using One-Way Delay Variation and Round-Trip Time)

  • 김동근;이재용
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.175-183
    • /
    • 2008
  • 네트워크에서 QoS(quality of Service) 제공 기술은 양단간 네트워크 경로의 안정성과 성능의 정도를 나타내는 QoS 척도에 대한 실제 측정에 기반을 두고 있다. QoS 척도 중에서 특히 단방향 지연의 측정은 양단간 두 측정 지점간의 클럭(clock) 동기가 선행되어야 한다. 하지만, 네트워크에서 모든 단말 또는 호스트(host) 사이에는 절대적 또는 상대적인 시간 차이가 존재한다. 본 논문에서는, 단방향 지연 단방향 지연 변이와 일주 지연(round-trip time: RTT) 간의 관계식을 새롭게 유도하여 추정 오류가 일주지연의 사분의 일 이하가 됨을 수학적으로 보여주며, 이를 이용한 단방향 지연과 클럭 오프셋(offset)의 추정 기법을 제안하고 실험을 통하여 본 제안의 유용성을 보여준다.

  • PDF

Impossible Differential Cryptanalysis on Lai-Massey Scheme

  • Guo, Rui;Jin, Chenhui
    • ETRI Journal
    • /
    • 제36권6호
    • /
    • pp.1032-1040
    • /
    • 2014
  • The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of block ciphers. This paper studies the impossible differential cryptanalysis of the Lai-Massey scheme with affine orthomorphism for the first time. Firstly, we prove that there always exist 4-round impossible differentials of a Lai-Massey cipher having a bijective F-function. Such 4-round impossible differentials can be used to help find 4-round impossible differentials of FOX64 and FOX128. Moreover, we give some sufficient conditions to characterize the existence of 5-, 6-, and 7-round impossible differentials of Lai-Massey ciphers having a substitution-permutation (SP) F-function, and we observe that if Lai-Massey ciphers having an SP F-function use the same diffusion layer and orthomorphism as a FOX64, then there are indeed 5- and 6-round impossible differentials. These results indicate that both the diffusion layer and orthomorphism should be chosen carefully so as to make the Lai-Massey cipher secure against impossible differential cryptanalysis.

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

롤 회전을 이용한 장입유도탄 비정렬각 산출기법 (A Calculation Method for the Tilt Angle of Missile Round using Roll Rotation)

  • 박동현
    • 한국항행학회논문지
    • /
    • 제22권6호
    • /
    • pp.500-506
    • /
    • 2018
  • 본 논문에서는 유도탄의 정확한 자세를 알기 위해 주 관성항법장치와 유도탄 내부 관성항법장치를 이용하는 one-shot 정렬에 대해 고려하였다. One-shot정렬을 수행하기 위해서는 주 관성항법장치와 부 관성항법장치 사이의 비정렬각을 구해야 되는데, 장입유도탄과 부 관성항법장치 사이의 비정렬각을 구하여 보상하면 된다. 비정렬각은 장입유도탄의 롤 회전을 이용하여 산출되며, 장입유도탄을 회전하기 위한 정렬용 치구, 장입유도탄의 수평 상태를 측정하기 위한 수평각도계와 인터페이스 구조물이 제작되었다. TAS(tilt angle save) 점검 결과, 비정렬각 ${\alpha}$, ${\beta}$, ${\gamma}$ 값이 정상 범위이며 이 값을 보상하여 one-shot 정렬을 수행할 수 있다.

타날문단경호(打捺文短頸壺)의 연구(硏究) (The Paddling and Round Pots)

  • 이성주
    • 헤리티지:역사와 과학
    • /
    • 제33권
    • /
    • pp.4-35
    • /
    • 2000
  • The paddling technique is a Kind of secondary treatments in the process of ceramic forming, which appeared in the Chinese Neolithic Age pottery making. In the case of Korean prehistoric pottery making, it was first introduced together with the kiln firing method from Tongpei region(東北地方) of China in Yan(燕) dynasty occupation period. Korean archaeologists have recognized the adoption of the new technologies as a drastic innovation of ceramic production. And most of them have thought that the diffusion of new techniques, accompanied by the migration of the northern ethnic groups, had been immediately followed by the innovative changes in pottery procdution. However, rejecting the arguments from the simple diffusionist viewpoint, I have first tried to describe the innovation processes in the ceramic production systems as a spatio-temporal process. The paddling technique by the cord-wound paddle, which was first introduced among the various paddles, was associated with the new sort of pottery, round pots fired in low temperature of reducing atmosphere condition. The cord-marked round pots first tried by the indigenous potters in the southern part of Korean were characterized by the relatively low leveled techniques in forming and firing, compared to those of north-east China. The techniques of the round pots were hardly improved in the domestic production system until the appearance of the fully-specialized one. The specialized production system of the round pot, which appeared first in the mid-western region of Korea, showed the diversified paddling techniques and made the noticeable improvements in forming and firing processes.

데이터 재사용 기법을 이용한 저 면적 DNN Core (Low-area DNN Core using data reuse technique)

  • 조철원;이광엽;김치용
    • 전기전자학회논문지
    • /
    • 제25권1호
    • /
    • pp.229-233
    • /
    • 2021
  • 임베디드 환경에서의 NPU는 적은 하드웨어 자원으로 딥러닝 알고리즘을 수행한다. 데이터를 재사용하는 기법을 활용하면 적은 자원으로 딥러닝 알고리즘을 효율적으로 연산할 수 있다. 선행연구에서는 데이터 재사용을 위해 ScratchPad에서 shifter를 사용해 데이터를 재사용한다. 하지만 ScratchPad의 Bandwidth가 커짐에 따라 shifter 역시 많은 자원을 소모한다. 따라서 Buffer Round Robin방식을 사용한 데이터 재사용 기법을 제시한다. 본 논문에서 제시하는 Buffer Round Robin 방식을 사용하여 기존의 방식보다 약 4.7%의 Chip Area를 줄일 수 있었다.

효율적인 다중 일치 프로토콜 (An Efficient Multiparty Consensus Protocol)

  • 김수진;류제철
    • 정보보호학회지
    • /
    • 제2권4호
    • /
    • pp.17-29
    • /
    • 1992
  • 본 논문에서는 시스템 내의 모든sote들에게 분산되어 있는 정보들을 수렴하여 일치를 이루고, 그 결과를 모든 site들이 알도록 하는 다중 일치 프로토콜을 위한 효과적인 통신 방법을 제안하고자 한다. 분산 시스템에 참여하는 computer 또는 site들의 수를 N이라 할때, $O(N^2)$의 message를 필요로하면서 한 round안에 일치를 이룰 수 있는 프로토콜은 message의 수가 너무 많다는 것이 단점이다. 이에 본 논문에서는 Finite Projective Planes을 이용하여 message의 수를 줄이면서 두 round 안에 일치를 이룰 수 있는 통신 방법을 제안한다. 이때, 각 round마다 필요한 message의 수는 O(N$)이다. 또한, 이 통신 방법에서 이용되는 Finite Projective Planes을 구축하는 알고리즘을 제안하고자한다.

  • PDF

Vision을 이용한 실시간 모서리 가공부재의 에지검출 자동화 (Real Time Edge Detection for Rounding Machines Using by CCD Vision)

  • 박종현;함이준;노태정;김경환;손상익
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2000년도 추계학술대회 논문집
    • /
    • pp.695-698
    • /
    • 2000
  • Round-cornering machines are mainly used for cornering of stiffners for ship buildings. In the present time they have been operated manually by operators. so they are need to be operated automatically without regard to any shapes of stiffners. We developed the automatic round cornering system which consists of CCd Camera, PC and laser diode to detect automatically the edge of stiffners to be processed

  • PDF