• Title/Summary/Keyword: CAO

Search Result 1,059, Processing Time 0.036 seconds

Function Approximation Using Cao s Fuzzy System (Cao의 퍼지 시스템을 이용한 함수 근사)

  • 길준민;박대희;박주영
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.111-116
    • /
    • 1995
  • 본 논문의 목적은 Cao의 퍼지 추론에 기초한 퍼지 시스템이 Universal Approximator임을 증명함으로써 Cao의 퍼지 시스템을 비선형 모델링 문제에 적용하기 위한 이론적 토대를 제공하는 것이다. 즉 우리는 Cao의 퍼지 논리 시스템을 특별한 형태로 수식화하고 수식화된 Cao의 퍼지는 논리 시스템이 임의의 비선형 함수를 충분히 정확하게 근사할 수 있다는 것을 보인다. 이와 같이 증명된 이론은 Cao의 퍼지 시스템이 실제의 공학적 문제에 어떻게 성공적으로 적용되었는지를 설명할 수 있다.

  • PDF

Security of the revised Xue-Cao threshold proxy signature scheme (개선된 Xue-Cao threshold 대리서명 기법의 안전성)

  • Park Je-Hong;Park Sang-Woo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.79-82
    • /
    • 2006
  • 다중 사용자 환경에서 안전한 대리서명을 설계하는 연구의 하나로, threshold 서명 방식을 대리서명에 적용한 threshold 대리서명 기법들이 최근 많이 제안되고 있다. Xue와 Cao가 2004년 발표한 threshold 대리서명 기법은 Hsu-Wu 자체인증 공개키 방식 (Self-certified public key)을 기반으로 설계된 것으로 WISA 2005, CISC 2005, ICCSA 2006에서 각각 다른 취약성이 밝혀진 바 있다. 특히 CISC 2005, ICCSA 2006에서는 각각의 공격방법에 내성을 가질 수 있도록 Xue-Cao 기법을 개선하는 방안을 같이 제시하였다. 본 논문에서는 이러한 개선안이 적용된 Xue-Cao 기법에 대해 두 가지 종류의 원서명자 위조 공격이 가능함을 보인다. 하나는 Hsu-Wu 자체인증 공개키 방식의 취약성을 이용하는 것이고 다른 하나는 Xue-Cao 기법의 서명 생성 방식의 취약성에 기반한 것이다. 이러한 공격을 통해 개선된 Xue-Cao 기법 또한 대리자 보호, 부인방지와 같은 안전성 조건을 만족하지 않음을 확인한다.

  • PDF

Z. Cao's Fuzzy Reasoning Method using Learning Ability (학습기능을 사용한 Z. Cao의 퍼지추론방식)

  • Park, Jin-Hyun;Lee, Tae-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.193-196
    • /
    • 2008
  • Z. Cao had proposed NFRM(new fuzzy reasoning method) which infers in detail using relation matrix. In spite of the small inference rules, it shows good performance than mamdani's fuzzy inference method. In this paper, we propose 2. Cao's fuzzy inference method using learning ability witch is used a gradient descent method in order to improve the performances. Because it is difficult to determine the relation matrix elements by trial and error method which is needed many hours and effort. Simulation results are applied linear and nonlinear system show that the proposed inference method has good performances.

  • PDF

Z. Cao's Fuzzy Reasoning Method using Learning Ability (학습기능을 이용한 Z. Cao의 퍼지추론방식)

  • Park, Jin-Hyun;Lee, Tae-Hwan;Choi, Young-Kiu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1591-1598
    • /
    • 2008
  • Z. Cao had proposed NFRM(new fuzzy reasoning method) which infers in detail using relation matrix. In spite of the small inference rules, it shows good performance than mamdani's fuzzy inference method. In this paper, we propose Z. Cao's fuzzy inference method with learning ability which is used a gradient descent method in order to improve the performances. It is hard to determine the relation matrix elements by trial and error method. Because this method is needed many hours and effort. Simulation results are applied nonlinear systems show that the proposed inference method using a gradient descent method has good performances.

Cao-e's story and Its Case Study on the culture archetype contents (조아(曹娥)설화와 문화원형콘텐츠 사례연구)

  • Jo, Jeong-rae
    • Cartoon and Animation Studies
    • /
    • s.47
    • /
    • pp.439-461
    • /
    • 2017
  • The filial piety culture represented by Cao-e was regarded as moral rule mechanism in order to maintain patriarchal system and property relations in ancient China as an agricultural society. Exactly, In the process of Cao-e's story spreading, oral inheritance and literature processing have a relation of learning and penetration each other in order to beautify, deify, systematic stories. This is expression of human being's thought method of pursuing perfection. For instance, The traditional piety culture is increasingly weakened, that is why it is important to recognize the fundamental connotation behind the cultural identity in the modern society, to create the social foundation of Cao-e' filial piety cultural contents root, and to explore the core values of piety culture contains. Looking Cao-e' filial piety Culture and culture archetypes as study object, this article analyzes the spreading of Cao-e's story texts for understand the connection between literature processing and image formation from aspect of Cao-e deification.

Preparation and Structural Analysis of Cao-SiO2 Gel by Sol-Gel Method (졸 겔 법을 이용한 Cao-SiO2계 겔의 합성 및 구조분석)

  • Lee, Tae-Hyung;Lee, Su-Jeong;Hwang, Yeon;Kim, Ill-Young;Ohtsuki, Chikara;Cho, Sung-Baek
    • Journal of the Korean Ceramic Society
    • /
    • v.45 no.10
    • /
    • pp.644-650
    • /
    • 2008
  • It has been proposed that the Cao-$SiO_2$ binary system can be good basic composition of bioactive glasses and glass-ceramics. In the present study, various kinds of Cao-$SiO_2$ gels were prepared by sol-gel method in order to control the microstructure which are related to their dissolution rate, induction period of apatite formation in body environment. Characterization of the gels were done by wet chemical analysis, SEM observation, FT-IR spectroscopy and XRD. The gelation time decreased with CaO content. However, the volume of all the dried gel decreased to 50% of the wet gels irrespective of increasement of CaO content. All the Cao-$SiO_2$ gels were amorphous and contained a large amount of silanol groups on their surfaces after heat treatment up to $800^{\circ}C$. The interconnected structure of the gel changed to agglomerated spherical powders when Ca content exceed to 20 mol%. Most of the Cao-$SiO_2$ gel showed amorphous when heat-treated up to $900^{\circ}C$. However, quartz and cristobalite was produced when heat-treated at $1000^{\circ}C$ and resultant microstructure of the gel contained microporous structure.

A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family (제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법)

  • Kim, Taeyoung;Lee, Jihyun;Kim, Eunmi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Similar software is often developed with the Clone-And-Own (CAO) approach that copies and modifies existing artifacts. The CAO approach is considered as a bad practice because it makes maintenance difficult as the number of cloned products increases. Software product line engineering is a methodology that can solve the issue of the CAO approach by developing a product family through systematic reuse. Migrating product families that have been developed with the CAO approach to the product line engineering begins with finding, integrating, and building them as reusable assets. However, cloning occurs at various levels from directories to code lines, and their structures can be changed. This makes it difficult to build product line code base simply by finding clones. Successful migration thus requires unifying the source code's file path, class name, and method signature. This paper proposes a clustering method that identifies a set of similar codes scattered across product variants and some of their method full paths are different, so path unification is necessary. In order to show the effectiveness of the proposed method, we conducted an experiment using the Apo Games product line, which has evolved with the CAO approach. As a result, the average precision of clustering performed without preprocessing was 0.91 and the number of identified common clusters was 0, whereas our method showed 0.98 and 15 respectively.

Cryptanalysis on Lu-Cao's Key Exchange Protocol (Lu-Cao 패스워드기반 키 교환 프로토콜의 안전성 분석)

  • Youn, Taek-Young;Cho, Sung-Min;Park, Young-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.163-165
    • /
    • 2008
  • Recently, Lu and Cao proposed a password-authenticated key exchange protocol in the three party setting, and the authors claimed that their protocol works within three rounds. In this paper, we analyze the protocol and show the protocol cannot work within three rounds. We also find two security flaws in the protocol. The protocol is vulnerable to an undetectable password guessing attack and an off-line password guessing attack.

  • PDF

Security analysis on the Gu-Xue improved secret handshakes scheme (Gu-Xue의 개선된 Secret Handshake 기법의 안전성 분석)

  • Youn, Taek-Young;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.655-658
    • /
    • 2012
  • Recently, Gu and Xue proposed an improved secret handshakes scheme with unlinkability by modifying the Huang-Cao scheme. Their proposal not only solves security weakness in the Huang-Cao scheme but also is more efficient than previously proposed secret handshakes schemes. In this letter, we examine the correctness of Gu and Xue's security requirements and show that the adversary model is not correctly defined. We also show that the Gu-Xue scheme is not secure against the attacks under correctly defined adversary model.