• Title/Summary/Keyword: Brent method

Search Result 10, Processing Time 0.023 seconds

Cycle Detection in Discrete Logarithm Using a Queue (큐를 이용한 이산대수의 사이클 검출)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.1-7
    • /
    • 2017
  • This paper proposes a discrete logarithm algorithm that largely reduces execution times of Pollard's Rho and Brent's algorithm in obtaining ${\gamma}$ from ${\alpha}^{\gamma}{\equiv}{\beta}$(mod p). The proposed algorithm can be distinguished from the conventional Brent's algorithm by three major features: it sets an initial value as $x_0={\alpha}{\beta}$ in lieu of $x_0=1$; replaces $y=x_i$, ($i=2^k$) pointer with $y_j{\leftarrow}x_i$, ($i=2^k$, $1{\leq}j{\leq}10$) for a Queue the size 10; and detects collision of ${\beta}_{\gamma}$, ${\beta}_{{\gamma}^{\prime}}$, ${\beta}_{{\gamma}^{-1}}$ instead of ${\beta}_{\gamma}$. This Queue method has reduced the execution time of Pollard's Rho algorithm with $x_0=y_0=1$ by 65.02%, and that of Brent's algorithm with $x_0=1$ by 47.80%.

MUSIC-Based Direction Finding through Simple Signal Subspace Estimation (간단한 신호 부공간 추정을 통한 MUSIC 기반의 효과적인 도래방향 탐지)

  • Choi, Yang-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.153-159
    • /
    • 2011
  • The MUSIC (MUltiple SIgnal Classification) method estimates the directions of arrival (DOAs) of the signals impinging on a sensor array based on the fact that the noise subspace is orthogonal to the signal subspace. In the conventional MUSIC, an estimate of the basis for the noise subspace is obtained by eigendecomposing the sample matrix, which is computationally expensive. In this paper, we present a simple DOA estimation method which finds an estimate of the signal subspace basis directly from the columns of the sample matrix from which the noise power components are removed. DOA estimates are obtained by searching for minimum points of a cost function which is defined using the estimated signal subspace basis. The minimum points are efficiently found through the Brent method which employs parabolic interpolation. Simulation shows that the simple estimation method virtually has the same performance as the complex conventional method based on the eigendecomposition.

Quantile causality from dollar exchange rate to international oil price (원유가격에 대한 환율의 인과관계 : 비모수 분위수검정 접근)

  • Jeong, Kiho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.2
    • /
    • pp.361-369
    • /
    • 2017
  • This paper analyzes the causal relationship between dollar exchange rate and international oil price. Although large literature on the relationship has accumulated, results are not unique but diversified. Based on the idea that such diversified results may be due to different causality at different economic status, we considers an approach to test the causal relationship at each quantile. This approach is different from the mean causality analysis widely employed by the existing literature of the causal relationship. In this paper, monthly data from May 1987 to 2013 is used for the causal analysis in which Brent oil price and Major Currencies Dollar Index (MCDI) are considered. The test method is the nonparametric test for causality in quantile suggested by Jeong et al. (2012). The results show that although dollar exchange rate causes oil price in mean, the causal relationship does not exist at most quantiles.

A Constructive Modeling Process in the Form of 'Visual Mathematics' (시각수학과 원리 확장적 모델링 프로세스)

  • 김진희
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.89-95
    • /
    • 1999
  • Carlo H. Sequin, a computer scientist, became to know a sculpture of subtle space construction which was created by Brent Collins, a sculptor, and introduced it as 'Visual Mathematics' in a journal. Sequin who was able to deduce a basic logic of the construction, has developed a software which can be used for virtual modeling merely by substituting simple numerical values using a computer and supplied it to Collins. The present author who was exposed to their collaboration works through series of their papers published in the journal, Leonardo, introduces the Collins' sculptures and the author's modeling procedures of animation works both of which show many common things in visual characteristics and modeling expansion method. The author investigates the mathematical characteristics which is used as a basic motive of modeling and then supplied as a principal visual characteristics of a material. 'Modeling Development by Principle Expansion,' in which the expansion is developed on the base of space twist as for Collins whereas the space section as for the present author, is introduced in this study. With the same stream of the mutual reaction in 'arts, sciences and technology' which has been stressed with the development of sciences and technology, this modeling technology is suggested as a research theme which has a possiblity of various applications.

  • PDF

Option Strategies: An Analysis of Naked Put Writing

  • Lekvin Brent J.;Tiwari Ashish
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.2
    • /
    • pp.329-364
    • /
    • 1996
  • Writing naked put options is a strategy employed either as a speculation to capture premium income, or as a method of placing a limit order to buy the underlying at the strike price in return for premium received. Using a Monte Carlo simulation, twenty thousand equity prices are generated under known volatility and return parameters. A binomial tree is constructed using the same volatility and return parameters. Put options on these 'equities' are valued with the binomial methodology. The performance of various put writing strategies is evaluated on a risk-adjusted basis. Evidence presented suggests that the judicious use of put options may enhance returns during portfolio construction.

  • PDF

A Study of Bitcoin Transaction Tracking Method through Illegal Community (불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구)

  • Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.717-727
    • /
    • 2018
  • When illegal transactions are made with bitcoin, it's not easy to track all the bitcoins used in the transaction and seize them. Especially, if criminals distribute illegal transactions by spreading them to several bitcoin addresses, it's difficult to track hidden bitcoins other than confiscated bitcoins even if some bitcoins are confiscated. This paper proposes a method for tracking and monitoring all bitcoin transactions suspected of illegal transactions. This method estimates bitcoin addresses that are highly relevant to crime among all bitcoin addresses that dealing with the address based on the bitcoin address list of the alleged crime, and keeps track of addresses that are relevant to crime and help to investigate illegal bitcoin transaction.

Treatment of Fingertip Amputation in Adults by Palmar Pocketing of the Amputated Part

  • Jung, Mi Sun;Lim, Young Kook;Hong, Yong Taek;Kim, Hoon Nam
    • Archives of Plastic Surgery
    • /
    • v.39 no.4
    • /
    • pp.404-410
    • /
    • 2012
  • Background First suggested by Brent in 1979, the pocket principle is an alternative method for patients for whom a microsurgical replantation is not feasible. We report the successful results of a modified palmar pocket method in adults. Methods Between 2004 and 2008, we treated 10 patients by nonmicrosurgical replantation using palmar pocketing. All patients were adults who sustained a complete fingertip amputation from the tip to lunula in a digits. In all of these patients, the amputation occurred due to a crush or avulsion-type injury, and a microsurgical replantation was not feasible. We used the palmar pocketing method following a composite graft in these patients and prepared the pocket in the subcutaneous layer of the ipsilateral palm. Results Of a total of 10 cases, nine had complete survival of the replantation and one had 20% partial necrosis. All of the cases were managed to conserve the fingernails, which led to acceptable cosmetic results. Conclusions A composite graft and palmar pocketing in adult cases of fingertip injury constitute a simple, reliable operation for digital amputation extending from the tip to the lunula. These methods had satisfactory results.

A Study on Regionalization in the World Crude Oil Markets Using Cointegration and Causality Analysis (공적분과 인과관계 분석을 통한 국제원유시장의 지역화 연구)

  • Kim, Jinsoo;Heo, Eunnyeong;Kim, Yeonbae
    • Environmental and Resource Economics Review
    • /
    • v.16 no.2
    • /
    • pp.213-237
    • /
    • 2007
  • Discussions on regionalization of the world crude oil markets have provided important implications for the establishment of national energy policies. In particular, due to arbitrage trading, if these markets are regionalized, Korea who imports approximately 80% of the annual oil consumption from a single region may be faced with a crucial problem. Therefore, in this study, we analyzed regionalization of the world crude oil markets using causality analysis as well as cointegration method to consider temporal relationship and time lags. To analyze regionalization, we chose Dubai price for the Middle East market, Brent for the European, WTI for the U.S., and Tapis for the East Asian. For the case that long-run equilibrium existed between market prices, we used vector error correction model to analyze causal relationship, and for the case that equilibrium did not exist, we used Hsiao (1981)'s framework that can consider asymmetric time lags in the model for causality analysis. By the results of cointegration analysis, there did not exist long-run equilibrium among Dubai price and the other prices. However, we found the causal relationship among Dubai price and the other prices with one to four weeks time lags. Therefore, in effect, we could conclude that the world crude oil markets are unified supporting Adelman (1984)'s hypothesis.

  • PDF

Visual Tracking of Objects for a Mobile Robot using Point Snake Algorithm

  • Kim, Won;Lee, Choon-Young;Lee, Ju-Jang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.30-34
    • /
    • 1998
  • Path Planning is one of the important fields in robot technologies. Local path planning may be done in on-line modes while recognizing an environment of robot by itself. In dynamic environments to obtain fluent information for environments vision system as a sensing equipment is a one of the most necessary devices for safe and effective guidance of robots. If there is a predictor that tells what future sensing outputs will be, robot can respond to anticipated environmental changes in advance. The tracking of obstacles has a deep relationship to the prediction for safe navigation. We tried to deal with active contours, that is snakes, to find out the possibilities of stable tracking of objects in image plane. Snakes are defined based on energy functions, and can be deformed to a certain contour form which would converge to the minimum energy states by the forces produced from energy differences. By using point algorithm we could have more speedy convergence time because the Brent's method gives the solution to find the local minima fast. The snake algorithm may be applied to sequential image frames to track objects in the images by these characteristics of speedy convergence and robust edge detection ability.

  • PDF

Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA) (메모리 주소 변환 공격에 대한 스케줄러 기반의 방어 방법)

  • Jang, Daehee;Jang, Jinsoo;Kim, Donguk;Choi, Changho;Kang, Brent ByungHoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.873-880
    • /
    • 2015
  • Since hardware-based kernel-integrity monitoring systems run in the environments that are isolated from the monitored OS, attackers in the monitored OS cannot undermine the security of monitoring systems. However, because the monitoring is performed by using physical addresses, the hardware-based monitoring systems are vulnerable to Address Translation Redirection Attack (ATRA) that manipulates virtual-to-physical memory translations. To ameliorate this problem, we propose a scheduler-based ATRA detection method. The method detects ATRA during the process scheduling by leveraging the fact that kernel scheduler engages every context switch of processes. We implemented a prototype on Android emulator and TizenTV, and verified that it successfully detected ATRA without incurring any significant performance loss.