• Title/Summary/Keyword: Engineering Identities

Search Result 96, Processing Time 0.02 seconds

NOTE ON SOME CHARACTER FORMULAS

  • Chaudhary, Mahendra Pal;Chaudhary, Sangeeta;Choi, Junesang
    • Honam Mathematical Journal
    • /
    • v.38 no.4
    • /
    • pp.809-818
    • /
    • 2016
  • Chaudhary and Choi [7] presented 14 identities which reveal certain interesting interrelations among character formulas, combinatorial partition identities and continued partition identities. In this sequel, we aim to give slightly modified versions for 8 identities which are chosen among the above-mentioned 14 formulas.

IDENTITIES OF SYMMETRY FOR THE HIGHER ORDER q-BERNOULLI POLYNOMIALS

  • Son, Jin-Woo
    • Journal of the Korean Mathematical Society
    • /
    • v.51 no.5
    • /
    • pp.1045-1073
    • /
    • 2014
  • The study of the identities of symmetry for the Bernoulli polynomials arises from the study of Gauss's multiplication formula for the gamma function. There are many works in this direction. In the sense of p-adic analysis, the q-Bernoulli polynomials are natural extensions of the Bernoulli and Apostol-Bernoulli polynomials (see the introduction of this paper). By using the N-fold iterated Volkenborn integral, we derive serval identities of symmetry related to the q-extension power sums and the higher order q-Bernoulli polynomials. Many previous results are special cases of the results presented in this paper, including Tuenter's classical results on the symmetry relation between the power sum polynomials and the Bernoulli numbers in [A symmetry of power sum polynomials and Bernoulli numbers, Amer. Math. Monthly 108 (2001), no. 3, 258-261] and D. S. Kim's eight basic identities of symmetry in three variables related to the q-analogue power sums and the q-Bernoulli polynomials in [Identities of symmetry for q-Bernoulli polynomials, Comput. Math. Appl. 60 (2010), no. 8, 2350-2359].

SOME IDENTITIES ASSOCIATED WITH 2-VARIABLE TRUNCATED EXPONENTIAL BASED SHEFFER POLYNOMIAL SEQUENCES

  • Choi, Junesang;Jabee, Saima;Shadab, Mohd
    • Communications of the Korean Mathematical Society
    • /
    • v.35 no.2
    • /
    • pp.533-546
    • /
    • 2020
  • Since Sheffer introduced the so-called Sheffer polynomials in 1939, the polynomials have been extensively investigated, applied and classified. In this paper, by using matrix algebra, specifically, some properties of Pascal and Wronskian matrices, we aim to present certain interesting identities involving the 2-variable truncated exponential based Sheffer polynomial sequences. Also, we use the main results to give some interesting identities involving so-called 2-variable truncated exponential based Miller-Lee type polynomials. Further, we remark that a number of different identities involving the above polynomial sequences can be derived by applying the method here to other combined generating functions.

The Impact of Interdisciplinary Education on Technology and Society over Engineering Identities in Male and Female Students (기술과 사회에 관한 융합교육이 남녀학생의 공학 정체성에 미치는 영향)

  • Kim, Hyomin;Kim, Ji-Hyung;Kim, Jeongyeon;Kim, Gi-Jeong;Lim, Do-Yeon;Song, Sungsoo
    • Journal of Engineering Education Research
    • /
    • v.17 no.6
    • /
    • pp.69-76
    • /
    • 2014
  • This paper examined the influence of interdisciplinary education on technology and society over engineering identities of male and female students. For this purpose, we analyzed survey and essays of UNIST students who took the course of in 2013. Favorable feeling toward engineers, satisfaction with future career as engineers, positive regards of engineers' contribution to society increased to a statistically significant level within the group of female students who took the course. Interestingly, male students also formed more positive engineering identities after taking the course. Gender difference in engineering identities, which was statistically significant within the control group of non-takers, disappeared within students who took the course. Both male and female students learned to perceive engineering as a goal-oriented and contextualized exercises that can materialize new social values. In conclusion, interdisciplinary education on technology and society can make positive impacts on students' formation of engineering identities and sense of commitment.

FURTHER EXTENSION OF TWO RESULTS INVOLVING 0F1 DUE TO BAILEY

  • Groth, Frederick;Choi, Junesang;J, Prathima;Rathie, Arjun Kumar
    • East Asian mathematical journal
    • /
    • v.34 no.5
    • /
    • pp.597-600
    • /
    • 2018
  • Bailey presented two Bailey presented two interesting identities involving $_0F_1$, which have been generalized by Choi and Rathie who used two hypergeometric summation formulas due to Qureshi et al. In this note, we aim to show how one can establish, in an elementary way, two generalized formulas involving $_0F_1$ which include the above-mentioned identities as special cases. interesting identities involving 0F1, which

A Hybrid Blockchain-based Identity Management Framework for Devices in Microgrid (마이크로그리드에서 장치들을 위한 하이브리드 블록 체인 기반 식별 관리 프레임워크)

  • Cabacas, Regin A.;Ra, In-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.7-8
    • /
    • 2019
  • This paper presents a hybrid blockchain-based Identity Management Framework for devices in Microgrid. It incorporates the use of a Public and Private Blockchain platform to store and authenticate Microgrid device identities. It also emphasizes the shared responsibility of the manufacturers to provide the first layer of authentication for the devices they produce. Identities of each device are stored in the private and public Blockchain and authenticated using physically unclonable functions (PUF) and cryptographic functions.

  • PDF

NOTES ON SOME IDENTITIES INVOLVING THE RIEMANN ZETA FUNCTION

  • Lee, Hye-Rim;Ok, Bo-Myoung;Choi, June-Sang
    • Communications of the Korean Mathematical Society
    • /
    • v.17 no.1
    • /
    • pp.165-173
    • /
    • 2002
  • We first review Ramaswami's find Apostol's identities involving the Zeta function in a rather detailed manner. We then present corrected, or generalized formulas, or a different method of proof for some of them. We also give closed-form evaluation of some series involving the Riemann Zeta function by an integral representation of ζ(s) and Apostol's identities given here.

Toward Trustworthy Social Network Services: A Robust Design of Recommender Systems

  • Noh, Giseop;Oh, Hayoung;Lee, Kyu-haeng;Kim, Chong-kwon
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.145-156
    • /
    • 2015
  • In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.

Multiple Identities Node Detection in Zigbee Home Network (지그비 홈 네트워크에서의 다중신원(Multiple Identities)노드 탐지)

  • Lee Kyu-Ho;Lim Jae-Sung;Kim Dong-Kyoo;Jeon Sang-Kyoo;Yang Sung-Hyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.423-426
    • /
    • 2006
  • 홈서비스를 위한 지그비 센서 네트워크는 특정 대상이나 환경으로부터 데이터를 수집하여 그 데이터를 정보 분석이나 서비스 결정 수단으로 이용하기 때문에 데이터수집 과정에서의 효과적인 보안이 요구되어 진다. 지그비 센서 네트워크에의 공격은 정상적인 홈서비스를 방해하여 사용자의 불편을 초래할 수 있다. 이 중 다중신원을 가지는 공격자 노드의 침입은 비정상적인 정보 수집을 초래하여 서비스에서의 잘못된 결정을 유발할 수 있다. 이 다중신원노드의 탐지를 위해 본 논문에서는 DMIN(Detection of Multiple ID Node)이란 기법을 제안한다. 이 기법은 일처리 능력이 제한되어 있는 하나의 센서노드가 여러 신원의 역할을 수행할 때에 생기는 지연시간을 이용하며 이 기법을 이용하여 네트워크의 다중신원노드를 탐지한다.

  • PDF