• Title/Summary/Keyword: 한국 수학

Search Result 10,225, Processing Time 0.035 seconds

Implementation of Markov chain: Review and new application (관리도에서 Markov연쇄의 적용: 복습 및 새로운 응용)

  • Park, Changsoon
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.4
    • /
    • pp.537-556
    • /
    • 2021
  • Properties of statistical process control procedures may not be derived analytically in many cases; however, the application of a Markov chain can solve such problems. This article shows how to derive the properties of the process control procedures using the generated Markov chains when the control statistic satisfies the Markov property. Markov chain approaches that appear in the literature (such as the statistical design and economic design of the control chart as well as the variable sampling rate design) are reviewed along with the introduction of research results for application to a new control procedure and reset chart. The joint application of a Markov chain approach and analytical solutions (when available) can guarantee the correct derivation of the properties. A Markov chain approach is recommended over simulation studies due to its precise derivation of properties and short calculation times.

A Pre-Study on the Open Source Prometheus Monitoring System (오픈소스 Prometheus 모니터링 시스템의 사전연구)

  • An, Seong Yeol;Cha, Yoon Seok;Jeon, Eun Jin;Gwon, Gwi Yeong;Shin, Byeong Chun;Cha, Byeong Rae
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.110-118
    • /
    • 2021
  • The Internet of Things (IoT) technology, a key growth engine of the 4th industrial revolution, has grown to a stage where it can autonomously communicate with each other and process data according to space and circumstances. Accordingly, the IT infrastructure becomes increasingly complex and the importance of the monitoring field for maintaining the system stably is increasing. Monitoring technology has been used in the past, but there is a need to find a flexible monitoring system that can respond to the rapidly changing ICT technology. This paper conducts research on designing and testing an open source-based Prometheus monitoring system. We builds a simple infrastructure based on IoT devices and collects data about devices through the Exporter. Prometheus collects data based on pull and then integrates into one dashboard using Grafana and visualizes data to monitor device information.

The Meta-Analysis on Effects of Python Education for Adolescents (청소년 대상 파이썬(Python) 활용 교육의 효과에 대한 메타분석)

  • Jang, Bong Seok;Yoon, So Hee
    • Journal of Practical Engineering Education
    • /
    • v.12 no.2
    • /
    • pp.363-369
    • /
    • 2020
  • This study intends to examine effects of python education for adolescents. 6 primary studies were chosen through careful search process and investigated through meta-analysis. Research findings were as follows. The total effect size was 0.684. Second, the effect sizes of dependent variables were academic achievement 0.871, cognitive domain 0.625, and affective domain 0.428 in order. Third, for cognitive domain, the effect sizes were self-efficacy 0.833, problem-solving 0.283, computing thinking 0.276, and coding competency 0.251 in order. Fourth, for affective domain, the effect sizes were learning interest 0.560 and programming interest 0.417 in order. Fifth, regarding school level, the effect sizes were middle school 0.851, high school 0.585, and college 0.435 in order. Finally, for subject areas, the effect sizes were mathematics 1.057, design 0.595, information 0.585, and software 0.28 in order.

Design of Efficient NTT-based Polynomial Multiplier (NTT 기반의 효율적인 다항식 곱셈기 설계)

  • Lee, SeungHo;Lee, DongChan;Kim, Yongmin
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.88-94
    • /
    • 2021
  • Public-key cryptographic algorithms such as RSA and ECC, which are currently in use, have used mathematical problems that would take a long time to calculate with current computers for encryption. But those algorithms can be easily broken by the Shor algorithm using the quantum computer. Lattice-based cryptography is proposed as new public-key encryption for the post-quantum era. This cryptographic algorithm is performed in the Polynomial Ring, and polynomial multiplication requires the most processing time. Therefore, a hardware model module is needed to calculate polynomial multiplication faster. Number Theoretic Transform, which called NTT, is the FFT performed in the finite field. The logic verification was performed using HDL, and the proposed design at the transistor level using Hspice was compared and analyzed to see how much improvement in delay time and power consumption was achieved. In the proposed design, the average delay was improved by 30% and the power consumption was reduced by more than 8%.

An Analysis Study of SW·AI elements of Primary Textbooks based on the 2015 Revised National Curriculum (2015 개정교육과정에 따른 초등학교 교과서의 SW·AI 요소 분석 연구)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.317-325
    • /
    • 2021
  • In this paper, the degree of reflection of SW·AI elements and CT elements was investigated and analyzed for a total of 44 textbooks of Korean, social, moral, mathematics and science textbooks based on the 2015 revised curriculum. As a result of the analysis, most of the activities of data collection, data analysis, and data presentation, which are ICT elements, were not reflected, and algorithm and programming elements were not reflected among SW·AI content elements, and there were no abstraction, automation, and generalization elements among CT elements. Therefore, in order to effectively implement SW·AI convergence education in elementary school subjects, we will expand ICT utilization activities to SW·AI utilization activities. Training on the understanding of SW·AI convergence education and improvement of teaching and learning methods using SW·AI is needed for teachers. In addition, it is necessary to establish an information curriculum and secure separate class hours for substantial SW·AI education.

Effect of the Integrated STEM Project Learning Themed 'Lighting of Quantum Dot Solution' on Science High-School Small-Group Students' Problem Solving and Scientific Attitude ('양자점 용액의 발광'을 주제로 한 융합형 STEM 프로젝트 학습이 과학고등학교 소집단 학생들의 문제해결력과 과학적 태도에 미치는 효과)

  • Yi, Seung-Woo;Kim, Youngmin
    • New Physics: Sae Mulli
    • /
    • v.68 no.12
    • /
    • pp.1356-1363
    • /
    • 2018
  • The purpose of this study was to investigate science high-school students' creativity and scientific attitude when an integrated science, technology, engineering and mathematics (STEM) project themed 'lighting of quantum dot solution' was applied to them. The subjects were a one team composed of 3 students in the 11th grade desiring to participate in the Korea Science Exhibition. They began with a scientific inquiry related to the physical properties of the QD solution and then gradually showed the process of expansion of their ideas into the integration of engineering, technology, and mathematics. Also, during the process, they showed problem solving ability and scientific attitudes, such as cooperation, endurance, and satisfaction of accomplishment.

Differential Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds (가변 라운드 수를 갖는 블록 암호에 대한 차분 연관 암호 공격)

  • Sung Jaechul;Kim Jongsung;Lee Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2005
  • Related-Cipher attack was introduced by Hongjun Wu in 2002. We can consider related ciphers as block ciphers with the same round function but different round number and their key schedules do not depend on the total round number. This attack can be applied to block ciphers when one uses some semi-equivalent keys in related ciphers. In this paper we introduce differential related-cipher attacks on block ciphers, which combine related-cipher attacks with differential cryptanalysis. We apply this attack to the block cipher ARIA and SC2000. Furthermore, related-cipher attack can be combined with other block cipher attacks such as linear cryptanalysis, higher-order differential cryptanalysis, and so on. In this point of view we also analyze some other block ciphers which use flexible number of rounds, SAFER++ and CAST-128.

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks (소프트웨어 구현에 적합한 스트림 암호의 대수적 공격에 대한 안전성)

  • Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.