• Title/Summary/Keyword: CPA

Search Result 282, Processing Time 0.021 seconds

Discovery of CPA`s Tacit Decision Knowledge Using Fuzzy Modeling

  • Li, Sheng-Tun;Shue, Li-Yen
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.278-282
    • /
    • 2001
  • The discovery of tacit knowledge from domain experts is one of the most exciting challenges in today\`s knowledge management. The nature of decision knowledge in determining the quality a firm\`s short-term liquidity is full of abstraction, ambiguity, and incompleteness, and presents a typical tacit knowledge extraction problem. In dealing with knowledge discovery of this nature, we propose a scheme that integrates both knowledge elicitation and knowledge discovery in the knowledge engineering processes. The knowledge elicitation component applies the Verbal Protocol Analysis to establish industrial cases as the basic knowledge data set. The knowledge discovery component then applies fuzzy clustering to the data set to build a fuzzy knowledge based system, which consists of a set of fuzzy rules representing the decision knowledge, and membership functions of each decision factor for verifying linguistic expression in the rules. The experimental results confirm that the proposed scheme can effectively discover the expert\`s tacit knowledge, and works as a feedback mechanism for human experts to fine-tune the conversion processes of converting tacit knowledge into implicit knowledge.

  • PDF

A New Public Key Encryption Scheme based on Layered Cellular Automata

  • Zhang, Xing;Lu, Rongxing;Zhang, Hong;Xu, Chungen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3572-3590
    • /
    • 2014
  • Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.

Sulfonation of Polyamide Containing Carboxylic Acid (Carboxylic acid를 함유한 sulfonated polynmide의 제조)

  • Jeon, Jong-Young;Lee, Gi-Jo
    • Journal of Sericultural and Entomological Science
    • /
    • v.48 no.1
    • /
    • pp.1-5
    • /
    • 2006
  • Polyamide containing carboxylic acid was sulfonated with chlorosulfonic acid in dichloroethane under various conditions. The impact of the sulfonating agent concentration, the reaction temperature, and the reaction time on the ion exchange capacity was investigated. The mechanical and thermal properties, the contact angle, and the change of poly-dispersity were calculated for studying change of their properties. The reactions were effective, when the temperature was below $10^{\circ}C$ and the concentration of chlorosulfonic acid was below 0.05 mol. The value of ion exchange capacity was increased with reaction time. Thermal and mechanical properties were nearly unchanged according to the degree of sulfonation, but the contact angle was increased with increasing the value of ion exchange capacity.

Side channel Attacks on LEA and Its Countermeasures (LEA에 대한 부채널 분석 및 대응 방법)

  • Park, Jin-Hak;Kim, Tae-Jong;An, Hyun-Jin;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.449-456
    • /
    • 2015
  • Recently, information security of IoT(Internet of Things) have been increasing to interest and many research groups have been studying for cryptographic algorithms, which are suitable for IoT environment. LEA(Lightweight Encryption Algorithm) developed by NSRI(National Security Research Institute) is commensurate with IoT. In this paper, we propose two first-order Correlation Power Analysis(CPA) attacks for LEA and experimentally demonstrate our attacks. Additionally, we suggest the mask countermeasure for LEA defeating our attacks. In order to estimate efficiency for the masked LEA, its operation cost is compared to operation time of masked AES.

A Study on the Forecasting of Employment Demand in Kenya Logistics Industry

  • Shin, Yong-John;Kim, Hyun-Duk;Lee, Sung-Yhun;Han, Hee-Jung;Pai, Hoo-Seok
    • Journal of Navigation and Port Research
    • /
    • v.39 no.2
    • /
    • pp.115-123
    • /
    • 2015
  • This study focused on the alternative to estimate the demand of employment in Kenya logistics. First of all, it investigated the importance and necessity of search about the present circumstance of the country's industry. Next, it reviewed respectively the concept and limitation of several previous models for employment, including Bureau of Labor Statistics, USA; ROA, Netherlands; IER (Institute for Employment Research), UK; and IAB, Germany. In regard to the demand forecasting of employers in logistics, it could anticipate more realistically the future demand by the time-lag approach. According to the findings, if value of output record 733,080 KSH million in 2015 and 970,640 in 2020, compared to 655,222 in 2013, demand on wage employment in logistics industry would be reached up to 95,860 in 2015 and 104,329 in 2020, compared to about 89,600 in 2012. To conclude, this study showed the more rational numbers about the demand forecasting of employment than the previous researches and displayed the systematic approach to estimate industry manpower in logistics.

Identity Based Proxy Re-encryption Scheme under LWE

  • Yin, Wei;Wen, Qiaoyan;Li, Wenmin;Zhang, Hua;Jin, Zheng Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6116-6132
    • /
    • 2017
  • The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.

A Study on Optimal Hydrophone Arrangement for The Direction Finding of High Speed Moving Target in Underwater (수중에서 고속 기동하는 표적의 방위 탐지를 위한 최적의 청음기 배치 연구)

  • Han, Min-Su;Choi, Jae-Yong;Kang, Dong-Seok;Son, Kweon;Lee, Phil-ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.369-375
    • /
    • 2017
  • One of good DF(Direction Finding) methods is based on TDOA(Time Difference of Arrival) estimation when finding underwater moving target. For small DF error, high time resolution A/D(Analog-to-digital) conversion board and long baseline are needed. But the result of sea trial about close-range and high speed moving target, spatial correlation coefficient and appeared poor properties below 0.3 when hydrophone arrangement are separated over 6 ${\lambda}$ because of underwater fading channel. And we also find out that the distance between hydrophone should be under 4 ${\lambda}$ apart to take advantage of spatial correlation coefficient gain and performance of DF in underwater moving channel environments.

RESEARCH ON LASER-ACCELERATED PROTON GENERATION AT KAERI

  • PARK SEONG HEE;LEE KITAE;CHA YOUNG HO;JEONG YOUNG UK;BAIK SUNG HOON;YOO BYUNG DUK
    • Nuclear Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.279-286
    • /
    • 2005
  • A prototype of a relativistic proton generation system, based on laser-induced plasma interaction, has been designed and fabricated. The system is composed of three major parts: a fs TW laser; a target chamber, including targets and controls; and a diagnostic system for charged particles and lasers. An Offner-type pulse stretcher for chirped pulse amplification (CPA) and eight pass pre-amplifier are installed. The main amplifier will be integrated with a new pumping laser. The design values of the laser at the first stage are 1 TW in power and 50 fs in pulse duration. We expect to generate protons with their maximum energy of approximately 3 MeV and the flux of at least $10^6$ per pulse using a 10 $\mu$m Al target. A prototype target chamber with eight 8-inch flanges, including target mounts, has been designed and fabricated. For laser diagnostics, an adaptive optics based on the Shack-Hartmann type, beam monitoring, and alignment system are all under development. For a charged particle, CR-39 detectors, a Thomson parabola spectrometer, and Si charged-particle detectors will be used for the density profile and energy spectrum. In this paper, we present the preliminary design for laser-induced proton generation. We also present plans for future work, as well as theoretical simulations.

Micronucleus Test of Pinella Rhizoma Aqueous Extracts in Bone Marrow Cells of Male ICR Mice - In Vivo Genotoxicity (반하 물 추출물의 ICR 마우스 골수세포를 이용한 소핵실험)

  • Park, Ji-Ha
    • Korean Journal of Oriental Medicine
    • /
    • v.15 no.3
    • /
    • pp.99-105
    • /
    • 2009
  • In this research, the genotoxic effects of Pinelliae Rhizoma (PR) extracts, one of famous herbal agents in Korean medicine were evaluated using the mouse micronucleus test. PR extracts was administered once a day for 2 continuous days by oral gavage to male ICR mice at doses of 2000, 1000, and 500 mg/kg. Cyclophosphamide was used as a known genotoxic agent in a positive control. The appearance of a micronucleus is used as an index for genotoxic potential. No PR extracts treatment-related abnormal clinical signs, body weight changes and mortalities were detected. Significant (p<0.01) increases of the numbers of polychromatic erythrocytes contain micronucleus in prepared bone marrow cells were detected in CPA and PR extracts 2000 mg/kg treated groups as compared with intact control, respectively. The results of intraperitoneal dose mouse bone marrow cell micronucleus test of PR extracts were positive in the present study. It is considered that there were no problems from cytotoxicity of PR extracts tested in this study because the polychromatic erythrocyte ratio was detected as > 0.42 in all tested groups.

  • PDF

Characteristics of Several Bacterial Isolates Capable of Degrading Chloroaliphatic Compounds via Hydrolytic Dechlorination

  • Song, Ji-Sook;Lee, Dong-Hun;Lee, Kyoung;Kim, Chi-Kyung
    • Journal of Microbiology
    • /
    • v.41 no.4
    • /
    • pp.277-283
    • /
    • 2003
  • Haloaliphatic hydrocarbons have been widely used as solvents and ingredients of pesticides and herbicides. However, when these compounds contaminate the environment, they can be very hazardous to animals and humans because of their potential toxicity and carcinogenicity. Therefore, lots of studies have been made for microbial degradation of those pollutant chemicals. In this study, 11 bacterial strains capable of degrading 1,2-dichloroethane (1,2-DCA), 2-chloropropionic acid (2-CPA), 2,3-dichloropropionic acid (2,3-DCPA), and 2-monochloroacetic acid (2-MCA) by hydrolytic dechlorination under aerobic conditions were isolated from wastewaters and rice paddy soil samples. Their morphological and biochemical characteristics and their degradation capabilities of haloaliphatic hydrocarbons were examined. On the basis of the 16S rDNA sequences, 8 different kinds of microbial species, including Pseudomonas plecoglossicida, Xanthobacter flavus, Ralstonia eutropha, were identified. All of the isolated strains can degrade MCA. In particular, strains UE-2 and UE-15 degraded 1,2-DCA, and strain CA-11 degraded 2,3-DCPA, which are hardly degraded by other strains.