• Title/Summary/Keyword: Prime Number

Search Result 374, Processing Time 0.021 seconds

A Study on Public key Exponential Cryptosystem for Security in Computer Networks (컴퓨터 네트워크의 보안을 위한 공개키 다항식 지수 암호시스템에 대한 연구)

  • Yang, Tae-Kyu
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, a public key exponential encryption algorithm for data security of computer network is proposed. This is based on the security to a difficulty of polynomial factorization. For the proposed public key exponential encryption, the public key generation algorithm selects two polynomials f(x,y,z) and g(x,y,z). The enciphering first selects plaintext polynomial W(x,y,z) and multiplies the public key polynomials, then the ciphertext is computed. In the proposed exponential encryption system of public key polynomial, an encryption is built by exponential encryption multiplied thrice by the optional integer number and again plus two public polynomials f(x,y,z) and g(x,y,z). This is an encryption system to enforce the security of encryption with help of prime factor added on RSA public key. The propriety of the proposed public key exponential cryptosystem algorithm is verified with the computer simulation.

  • PDF

Digital Diplomacy via Social Networks: A Cross-National Analysis of Governmental Usage of Facebook and Twitter for Digital Engagement

  • Ittefaq, Muhammad
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.1
    • /
    • pp.49-69
    • /
    • 2019
  • Over the last couple of years, digital diplomacy has become a fascinating area of research among Mass Communication, Peace and Conflict Studies, and International Affairs scholars. Social media and new technology open up new avenues for governments, individuals, and organizations to engage with foreign audiences. However, developing countries' governments are still lacking in the realization of the potential of social media. This study aims to analyze the usage of social media (Facebook & Twitter) by the two biggest countries in South Asia (Pakistan and India). I selected 10 government officials' social media accounts including prime ministers', national press offices', military public relations offices', public diplomacy divisions', and ministries of foreign offices' profiles. The study relies on quantitative content analysis and a comparative research approach. The total number of analyzed Twitter tweets (n=1,015) and Facebook posts (n=1,005) include 10 accounts, five from each country. In light of Kent and Taylor's (1998) dialogic communication framework, the results indicate that no digital engagement and dialogue occurs between government departments and the public through social networking sites. Government departments do not engage with local or foreign audiences through digital media. When comparing both countries, results reveal that India has more institutionalized and organized digital diplomacy. In terms of departmental use of social media, the digital diplomacy division and foreign office of India is more active than other government departments in that nation. Meanwhile, Pakistan's military public relations office and press office is more active than its other government departments. In conclusion, both countries realize the potential of social media in digital diplomacy, but still lack engagement with foreign audiences.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

Evaluation of Residual Strains under Pure Bending Loading for Colorless and Optically Transparent Polyimide Film for Flexible Display (유연 디스플레이용 무색 투명 폴리이미드 필름의 굽힘 잔류 변형률 평가)

  • Choi, Min-Sung;Park, Min-Seok;Park, Han-Yeong;Oh, Chung-Seog
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.4
    • /
    • pp.49-54
    • /
    • 2021
  • The display industry is transitioning from traditional rigid products such as flat panel displays to flexible or wearable ones designed to be folded or rolled. Accordingly, colorless and optically transparent polyimide (CPI) films are one of the prime candidates to substitute traditional cover glass as a passivation layer to accommodate product flexibility. However, CPI films subjected to repetitive pure bending loads inevitably entail an accumulation of residual strain that can eventually cause wrinkles or delamination in the underlying component after a certain number of static and cyclic loading. The purpose of this study is to establish an experimental method to systematically evaluate the bending residual strain of CPI films. Films were monotonically and cyclically wrapped on mandrels of various diameters to ensure a constant strain in each. After unwrapping the wound CPI film, the residual radius of curvature remaining on the film was measured and converted into residual strain. The critical radius of curvature at which residual strain does not remain was about 5 mm, and the residual strain decreased in proportion to the log time. It is expected that flexible displays can be reliably designed using the data between the applied bending strain and the residual strain.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Territorial Expansion the King Võ (Võ Vương, 1738-1765) in the Mekong Delta: Variation of Tám Thực Chi Kế (strategy of silkworm nibbling) and Dĩ Man Công Man (to strike barbarians by barbarians) in the Way to Build a New World Order (무왕(武王, 1738-1765) 시기 메콩 델타에서의 영토 확장 추이: 제국으로 가는 길, '잠식지계(蠶食之計)'와 '이만공만(以蠻攻蠻)'의 변주)

  • CHOI, Byung Wook
    • The Southeast Asian review
    • /
    • v.27 no.2
    • /
    • pp.37-76
    • /
    • 2017
  • $Nguy{\tilde{\hat{e}}}n$ Cư Trinh has two faces in the history of territorial expansion of Vietnam into the Mekong delta. One is his heroic contribution to the $Nguy{\tilde{\hat{e}}}n$ family gaining control over the large part of the Mekong delta. The other is his role to make the eyes of readers of Vietnamese history be fixed only to the present territory of Vietnam. To the readers, $Nguy{\tilde{\hat{e}}}n$ Cư Trinh's achievement of territorial expansion was the final stage of the nam $ti{\acute{\hat{e}}n$ of Vietnam. In fact, however, his achievement was partial. This study pays attention to the King $V{\tilde{o}}$ instead of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh in the history of the territorial expansion in the Mekong delta. King's goal was more ambitious. And the ambition was propelled by his dream to build a new world, and its order, in which his new capital, $Ph{\acute{u}}$ $Xu{\hat{a}}n$ was to be the center with his status as an emperor. To improve my assertion, three elements were examined in this article. First is the nature of $V{\tilde{o}}$ Vương's new kingship. Second is the preparation and the background of the military operation in the Mekong Delta. The nature of the new territory is the third element of the discussion. In 1744, six years after this ascending to the throne, $V{\tilde{o}}$ Vương declared he was a king. Author points out this event as the departure of the southern kingdom from the traditional dynasties based on the Red River delta. Besides, the government system, northern custom and way of dressings were abandoned and new southern modes were adopted. $V{\tilde{o}}$ Vương had enough tributary kingdoms such as Cambodia, Champa, Thủy $X{\tilde{a}}$, Hoả $X{\tilde{a}}$, Vạn Tượng, and Nam Chưởng. Compared with the $L{\hat{e}}$ empire, the number of the tributary kingdoms was higher and the number was equivalent to that of the Đại Nam empire of the 19th century. In reality, author claims, the King $V{\tilde{o}}^{\prime}s$ real intention was to become an emperor. Though he failed in using the title of emperor, he distinguished himself by claiming himself as the Heaven King, $Thi{\hat{e}}n$ Vương. Cambodian king's attack on the thousands of Cham ethnics in Cambodian territory was an enough reason to the King $V{\tilde{o}}^{\prime}s$ military intervention. He considered these Cham men and women as his amicable subjects, and he saw them a branch of the Cham communities in his realm. He declared war against Cambodia in 1750. At the same time he sent a lengthy letter to the Siamese king claiming that the Cambodia was his exclusive tributary kingdom. Before he launched a fatal strike on the Mekong delta which had been the southern part of Cambodia, $V{\tilde{o}}$ Vương renovated his capital $Ph{\acute{u}}$ $Xu{\hat{a}}n$ to the level of the new center of power equivalent to that of empire for his sake. Inflation, famine, economic distortion were also the features of this time. But this study pays attention more to the active policy of the King $V{\tilde{o}}$ as an empire builder than to the economic situation that has been told as the main reason for King $V{\tilde{o}}^{\prime}s$ annexation of the large part of the Mekong delta. From the year of 1754, by the initiative of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh, almost whole region of the Mekong delta within the current border line was incorporated into the territory of $V{\tilde{o}}$ Vương within three years, though the intention of the king was to extend his land to the right side of the Mekong Basin beyond the current border such as Kampong Cham, Prey Vieng, and Svai Rieng. The main reason was $V{\tilde{o}}$ Vương's need to expand his territory to be matched with that of his potential empire with the large number of the tributary kingdoms. King $V{\tilde{o}}^{\prime}s$ strategy was the variation of 'silkworm nibbling' and 'to strike barbarians by barbarians.' He ate the land of Lower Cambodia, the region of the Mekong delta step by step as silkworm nibbles mulberry leave(general meaning of $t{\acute{a}}m$ thực), but his final goal was to eat all(another meaning of $t{\acute{a}}m$ thực) the part of the Mekong delta including the three provinces of Cambodia mentioned above. He used Cham to strike Cambodian in the process of getting land from Long An area to $Ch{\hat{a}}u$ Đốc. This is a faithful application of the Dĩ Man $C{\hat{o}}ng$ Man (to strike barbarians by barbarians). In addition he used Chinese refugees led by the Mạc family or their quasi kingdom to gain land in the region of $H{\grave{a}}$ $Ti{\hat{e}}n$ and its environs from the hand of Cambodian king. This is another application of Dĩ Man $C{\hat{o}}ng$ Man. In sum, author claims a new way of looking at the origin of the imperial world order which emerged during the first half of the 19th century. It was not the result of the long history of Đại Việt empires based on the Red River delta, but the succession of the King $V{\tilde{o}}^{\prime}s$ new world based on $Ph{\acute{u}}$ $Xu{\hat{a}}n$. The same ways of Dĩ Man $C{\hat{o}}ng$ Man and $T{\acute{a}}m$ Thực Chi $K{\acute{\hat{e}}}$ were still used by $V{\tilde{o}}^{\prime}s$ descendents. His grandson Gia Long used man such as Thai, Khmer, Lao, Chinese, and European to win another man the '$T{\hat{a}}y$ Sơn bandits' that included many of Chinese pirates, Cham, and other mountain peoples. His great grand son Minh Mạng constructed a splendid empire. At the same time, however, Minh Mạng kept expanding the size of his empire by eating all the part of Cambodia and Cham territories.

Improvement in Calculating Engineer Standard Wage Rate and Its Appropriate Level Computation (엔지니어링 노임단가 산출기준 개선방안과 적정 노임단가 추정)

  • Lee, Jae Yul;Lee, Hae Kyung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.6
    • /
    • pp.853-860
    • /
    • 2022
  • The purpose of this study is to suggest an improvement plan for the calculation method of the engineer standard wage rate (ESWR) and to compute a reasonable ESWR. To this end, an adequacy review of theESWR calculation criteria was conducted along with an extensive engineering industry survey. The survey results were analyzed using an effective response sample of 748 companies out of 1,000 survey samples extracted by stratifying the 5,879 survey population. The main results were as follows. ①When calculating the engineering service fee, the prime contractor's engineer wage is suitable for the ESWR. The ESWR can be estimated by the formula 'average wage÷[1-proportion of subcontract orders×(1-subcontract rate)].' ② The field survey showed that the number of monthly working days was 20.35-20.54 days at 99 % confidence interval, which was significantly different from the current standard (22 days). In addition, as a result of a legal review of the ESWR criteria, it was found that the number of working days should be calculated in accordance with the Labor Standards Act after 2022. ③ Applying government guidelines, the time difference between the wage survey and the ESWR application can be corrected by the past ESWR increase rate for a specific period. ④ Using modeling based on the analysis above, the current ESWR was 13.5-14.5 % lower than the appropriate level. A lower ESWR was driven by the non-reflection of subcontract structure (4.1 %), overestimation of monthly work days (6.8-7.8 %), and application of past wage (2.6 %). The proposed model is expected to be widely used in policy making, as it can provide a useful framework for calculating the standard wage rate in similar industries as well as calculating appropriate engineering fees.

Performance Analysis of Implementation on Image Processing Algorithm for Multi-Access Memory System Including 16 Processing Elements (16개의 처리기를 가진 다중접근기억장치를 위한 영상처리 알고리즘의 구현에 대한 성능평가)

  • Lee, You-Jin;Kim, Jea-Hee;Park, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.8-14
    • /
    • 2012
  • Improving the speed of image processing is in great demand according to spread of high quality visual media or massive image applications such as 3D TV or movies, AR(Augmented reality). SIMD computer attached to a host computer can accelerate various image processing and massive data operations. MAMS is a multi-access memory system which is, along with multiple processing elements(PEs), adequate for establishing a high performance pipelined SIMD machine. MAMS supports simultaneous access to pq data elements within a horizontal, a vertical, or a block subarray with a constant interval in an arbitrary position in an $M{\times}N$ array of data elements, where the number of memory modules(MMs), m, is a prime number greater than pq. MAMS-PP4 is the first realization of the MAMS architecture, which consists of four PEs in a single chip and five MMs. This paper presents implementation of image processing algorithms and performance analysis for MAMS-PP16 which consists of 16 PEs with 17 MMs in an extension or the prior work, MAMS-PP4. The newly designed MAMS-PP16 has a 64 bit instruction format and application specific instruction set. The author develops a simulator of the MAMS-PP16 system, which implemented algorithms can be executed on. Performance analysis has done with this simulator executing implemented algorithms of processing images. The result of performance analysis verifies consistent response of MAMS-PP16 through the pyramid operation in image processing algorithms comparing with a Pentium-based serial processor. Executing the pyramid operation in MAMS-PP16 results in consistent response of processing time while randomly response time in a serial processor.

DISCRIMINATION BETWEEN VIRGIN OLIVE OILS FROM CRETE AND THE PELOPONESE USING NEAR INFRARED TRANSFLECTANCE SPECTROSCOPY

  • Flynn, Stephen J.;Downey, Gerard
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1520-1520
    • /
    • 2001
  • Food adulteration is a serious consumer fraud and a potentially dangerous practice. Regulatory authorities and food processors require a rapid, non-destructive test to accurately confirm authenticity in a range of food products and raw materials. Olive oil is prime target for adulteration either on the basis of the processing treatments used for its extraction (extra virgin vs virgin vs ordinary oil) or its geographical origin (e.g. Greek vs Italian vs Spanish). As part of an investigation into this problem, some preliminary work focused on the ability of near infrared spectroscopy to discriminate between virgin olive oils from separate regions of the Mediterranean i. e. Crete and the Peloponese. A total of 46 oils were collected: 18 originated in Crete and 28 in the Peloponese. Oils were stored in a temperature-controlled room at 2$0^{\circ}C$ prior to spectral collection at room temperature (15-18$^{\circ}C$). Samples (approximately 0.5$m\ell$) were placed in the centre of the quartz window in a camlock reflectance cell; the gold-plated baking plate was then gently placed into the cell against the glass so as to minimize the formation of air bubbles. The rear of the camlock cell was then screwed into place producing a sample thickness of 0.5mm. Spectra were recorded between 400 and 2498nm at 2nm intervals on a NIR Systems 6500 scanning monochromator. Spectral collection took place over 2-3 days. Data were analysed using both WINISI and The Unscrambler software to investigate the possibility of discriminating between the oils from Crete and the Peloponese. A number of data pre-treatments were used and discriminant models were developed using discriminant PLS (WINISI & Unscrambler) and SIMCA (Unscrambler). Despite the small number of samples involved, a satisfactory discrimination between these two oil types was achieved. Graphical examination of principal component scores for each oil type also holds out the possibility of separating oils from either Crete and the Peloponese on the basis of districts within each region. These preliminary data suggest the potential of near infrared spectroscopy to act as a screening technique for the confirmation of geographic origin of extra virgin olive oils. The sample presentation strategy adopted uses only small volumes of material and produces high quality spectra.

  • PDF

Exploring the Possibility of Using Lesson Play in Pre-Service Teacher Education (예비교사 교육에서 레슨 플레이의 활용가능성 탐색)

  • Kwon, Oh Nam;Park, Jung Sook;Park, Jae Hee;Park, Ji Hyun;Oh, Hye Mi;Jo, Hyung Mi
    • School Mathematics
    • /
    • v.15 no.4
    • /
    • pp.819-832
    • /
    • 2013
  • This study was performed to investigate the pedagogical knowledge of pre-service teachers and to explore the possibility of using Lesson Play in pre-service teacher education. Lesson Play refers to a lesson written in script form, featuring imagined interactions between a teacher and his/her students. The participants of this study were 20 pre-service teachers enrolled in mathematics education at a University in Seoul and they conducted a dialogue between a teacher and students who said that 91 is a prime number and 462 is a multiple number of 4. Conclusions were drawn based on the virtual scripts of pre-service teachers. First, it was found that the teaching strategies of pre-service teachers were not diverse. Second, pre-service teachers mainly explained the mathematical principles and concepts. Third, pre-service teachers could not understand the current state of students. Therefore, Lesson Play is helpful to analyse the pedagogical knowledge of pre-service teachers and is a applicable teaching method that can improve the practical knowledge of pre-service teachers.

  • PDF