• 제목/요약/키워드: Mathematical Computing

검색결과 339건 처리시간 0.025초

Developing Mathematics Creativity with Spreadsheets

  • Deane Arganbright
    • 한국수학교육학회지시리즈D:수학교육연구
    • /
    • 제9권3호
    • /
    • pp.187-201
    • /
    • 2005
  • The spreadsheet Microsoft Excel is the most widely used mathematical tool in today's workplace. Moreover, it is also an outstanding means for developing a surprisingly wide range of creative and innovative educational uses within such areas as mathematical modeling, visualization, and instruction. The spreadsheet's format provides us with a tool that closely parallels the way in which we naturally carry out problem solving, while the spreadsheet creation process itself illuminates the underlying mathematical concepts. In addition, the spreadsheet's visual layout allows us to introduce a broad variety of challenging and interesting topics, and to design creative demonstrations through eye-catching animated graphics. The material presented comes from actual classroom mathematics teaching experience in both industrially advanced and developing nations. A series of highly visual interactive illustrations from mathematics, the natural and social sciences, computing, engineering, and the arts provide a number of usable examples. The material discussed is applicable at diverse levels, ranging from schools and universities through adult education and in-service teacher development programs.

  • PDF

SECURE IDENTIFICATION AND SIGNATURE USING ZERO-KNOWLEDGE PROOFS AND BILINEAR PAIRINGS

  • Choi, Byung Mun;Lee, Young Whan
    • 충청수학회지
    • /
    • 제21권3호
    • /
    • pp.403-411
    • /
    • 2008
  • In 2005, A. Saxena, B. Soh and S. Priymak [10] proposed a two-flow blind identification protocol. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In 2008, Y. W. Lee [9] made a method of the active-intruder attack on their identification scheme and proposed a new zero-knowledge blind identification protocol for smart cards. In this paper, we give more simple and fast protocols than above protocols such that the prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. Computing the bilinear pairings is needed only for the verifier and is secure assuming the hardness of the Discrete-Logarithm Problem (DLP).

  • PDF

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • 충청수학회지
    • /
    • 제20권4호
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

STABILITY OF THE MILSTEIN METHOD FOR STOCHASTIC DIFFERENTIAL EQUATIONS WITH JUMPS

  • Hu, Lin;Gan, Siqing
    • Journal of applied mathematics & informatics
    • /
    • 제29권5_6호
    • /
    • pp.1311-1325
    • /
    • 2011
  • In this paper the Milstein method is proposed to approximate the solution of a linear stochastic differential equation with Poisson-driven jumps. The strong Milstein method and the weak Milstein method are shown to capture the mean square stability of the system. Furthermore using some technique, our result shows that these two kinds of Milstein methods can well reproduce the stochastically asymptotical stability of the system for all sufficiently small time-steps. Some numerical experiments are given to demonstrate the conclusions.

ON MINIMAL PRODUCT-ONE SEQUENCES OF MAXIMAL LENGTH OVER DIHEDRAL AND DICYCLIC GROUPS

  • Oh, Jun Seok;Zhong, Qinghai
    • 대한수학회논문집
    • /
    • 제35권1호
    • /
    • pp.83-116
    • /
    • 2020
  • Let G be a finite group. By a sequence over G, we mean a finite unordered sequence of terms from G, where repetition is allowed, and we say that it is a product-one sequence if its terms can be ordered such that their product equals the identity element of G. The large Davenport constant D(G) is the maximal length of a minimal product-one sequence, that is, a product-one sequence which cannot be factored into two non-trivial product-one subsequences. We provide explicit characterizations of all minimal product-one sequences of length D(G) over dihedral and dicyclic groups. Based on these characterizations we study the unions of sets of lengths of the monoid of product-one sequences over these groups.

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

  • Ma, Xiaofeng;Zhang, Yi;Song, Xiangfeng;Fan, Chao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5592-5609
    • /
    • 2017
  • JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.

COMPUTATION OF THE HAUSDORFF DISTANCE BETWEEN TWO ELLIPSES

  • Kim, Ik-Sung
    • 호남수학학술지
    • /
    • 제38권4호
    • /
    • pp.833-847
    • /
    • 2016
  • We are interested in the problem of finding the Hausdorff distance between two objects in ${\mathbb{R}}^2$, or in ${\mathbb{R}}^3$. In this paper, we develop an algorithm for computing the Hausdorff distance between two ellipses in ${\mathbb{R}}^3$. Our algorithm is mainly based on computing the distance between a point $u{\in}{\mathbb{R}}^3$ and a standard ellipse $E_s$, equipped with a pruning technique. This algorithm requires O(log M) operations, compared with O(M) operations for a direct method, to achieve a comparable accuracy. We give an example,and observe that the computational cost needed by our algorithm is only O(log M).

자동차 타이어 패턴소음 예측에 관한 연구 (A Study on the Pattern Noise Prediction of Automobile Tire)

  • 김병삼
    • 한국공작기계학회논문집
    • /
    • 제14권6호
    • /
    • pp.68-73
    • /
    • 2005
  • Tire manufactures have dealt with noise problem by varying the pitch of the tread. The various formulas for the variations are generally determined differently, however. Often these variations are based on a combination of trial and error, intuition, and economics. Some manufactures have models and analogs to test tread patterns and their variations. These efforts, however practical, do not determine the best variation beforehand or guarantee the best results. For this reason it was felt that a general mathematical approach fur determining the best variation was needed. Moreover, the method should be completely general, easy to use, and sufficiently accurate. This paper discusses a mathematical method called Mechanical Frequency Modulation(MFM) which meets the above requirements. Thus, MFM pertains to computing an irregular time sequence of events so that the resulting excitation spectrum is shaped to a preferred form. The first part of this paper treats the theoretical basis for computing an optimum variation ; the second part discusses experimental results and simulation program which corroborate the theory.

클라우드 환경에서의 암호화 데이터에 대한 효율적인 Top-K 질의 수행 기법 (Efficient Top-K Queries Computation for Encrypted Data in the Cloud)

  • 김종욱
    • 한국멀티미디어학회논문지
    • /
    • 제18권8호
    • /
    • pp.915-924
    • /
    • 2015
  • With growing popularity of cloud computing services, users can more easily manage massive amount of data by outsourcing them to the cloud, or more efficiently analyse large amount of data by leveraging IT infrastructure provided by the cloud. This, however, brings the security concerns of sensitive data. To provide data security, it is essential to encrypt sensitive data before uploading it to cloud computing services. Although data encryption helps provide data security, it negatively affects the performance of massive data analytics because it forbids the use of index and mathematical operation on encrypted data. Thus, in this paper, we propose a novel algorithm which enables to efficiently process a large amount of encrypted data. In particular, we propose a novel top-k processing algorithm on the massive amount of encrypted data in the cloud computing environments, and verify the performance of the proposed approach with real data experiments.

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.