• Title/Summary/Keyword: Primes

Search Result 112, Processing Time 0.02 seconds

A Study on Effective Menu Management Using David V Pavesic's Method (파베직 분석 방법을 이용한 효율적 메뉴관리에 관한 연구)

  • Go, Beom-Seok
    • Proceedings of the Korea Hospitality Industry Research Society Conference
    • /
    • 2005.11a
    • /
    • pp.80-91
    • /
    • 2005
  • Recently, hotel industry has realized the importance of food and beverage sales for the profit maximization, and the focuses on restaurant management has been growing. Accordingly, menu management in the F/B department is one of the most key factors determining the success or failure of business. Therefore, in this study, entree menu items of french restaurant in the deluxe hotel was analysed with presently theorized model of menu analysis, classified into four menu items. Also it was analyzed how those classified menu items influence on sales, number of sold, food cost percentage, contribution margin And, proper ways was presented to make restaurant managers and menu planner in order to increase food operation sales through proper modifications and methods on various menu analysis matrix. In Pavesic's menu analysis method, all of menu items have impact on the sales, number of sold, contribution margin and Primes, Sleepers do so on the food cost. The finding of this study was that Pavesic's menu analysis is superior to menu analysis in terms of the sales, number of sold, food cost percentage, contribution margin. Therefore, Pavesic's menu analysis is useful and efficient method in order to conduct menu engineering.

  • PDF

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

A Study on the Word 'is' in a Sentence "A Parallelogram is Trapezoid." ("평행사변형은 사다리꼴이다."에서 '이다'에 대한 고찰)

  • Yi, Gyuhee;Choi, Younggi
    • School Mathematics
    • /
    • v.18 no.3
    • /
    • pp.527-539
    • /
    • 2016
  • A word 'is' in "A parallelogram is trapezoid." is ambiguous and very rich when it comes to its meaning. In this paper, 'is' as in everyday language will be identified as semantic primes that can be interpreted in different ways depending on context and situation, and meanings of 'is' in mathematics will be discussed separately. Focusing on 'identity', 'is' will be reinterpreted in the view of equivalence relation and van Hieles' work. 'Is', as a mathematical sign, is thought to have a significant importance in producing mathematical ideas meaningfully.

FOOTPRINT AND MINIMUM DISTANCE FUNCTIONS

  • Nunez-Betancourt, Luis;Pitones, Yuriko;Villarreal, Rafael H.
    • Communications of the Korean Mathematical Society
    • /
    • v.33 no.1
    • /
    • pp.85-101
    • /
    • 2018
  • Let S be a polynomial ring over a field K, with a monomial order ${\prec}$, and let I be an unmixed graded ideal of S. In this paper we study two functions associated to I: The minimum distance function ${\delta}_I$ and the footprint function $fp_I$. It is shown that ${\delta}_I$ is positive and that $fp_I$ is positive if the initial ideal of I is unmixed. Then we show that if I is radical and its associated primes are generated by linear forms, then ${\delta}_I$ is strictly decreasing until it reaches the asymptotic value 1. If I is the edge ideal of a Cohen-Macaulay bipartite graph, we show that ${\delta}_I(d)=1$ for d greater than or equal to the regularity of S/I. For a graded ideal of dimension ${\geq}1$, whose initial ideal is a complete intersection, we give an exact sharp lower bound for the corresponding minimum distance function.

The Inhibiton Effects of Hypercholesterolemia and Platelet in Fermented and Non-Fermented Preparation of Garlic

  • Kim, Hyun-Kyoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.1-10
    • /
    • 2019
  • This Dietary cholesterol augments lipid profile and primes production and activation of platelets, leading to development of atherosclerosis which produce several detrimental effects on cardiovascular health. Ethnomedicine and Mediterranean diet are natural sources and cost effective modes against several ailments including cardiovascular diseases while fermented foods have gained interest due to their increased nutrient profile, enhanced bioavailability and efficacy. Garlic has been known to reduce cholesterol and inhibit platelet activation. We examined whether fermented garlic ameliorates effects of hypercholesterolemia and platelet functions in rats. Methodology: Male SD rats were fed with hypercholesterolemia diet and treated with spirulina, fermented and non-fermented preparations of garlic for one month. Platelet aggregation and granule secretion were assessed to evaluate platelet activation. Liver and kidney weights, lipid and enzymatic profile of serum and whole blood analysis was performed. Expressions of SREBP, ACAT-2 and HMG-CoA were assessed using RT-PCR while liver and adipose tissues were analyzed for histological changes. Both fermented and non-fermented garlic inhibited platelet aggregation and granule secretion while fermented garlic showed greater inhibitor tendency. Fermented garlic significantly reduced liver weight and triglycerides concentrations than non-fermented garlic. Similarly, fermented garlic greatly abrogated the detrimental effects of steatosis on liver and adipose tissues. Fermented garlic significantly improved lipid profile and modulated platelet functions, thereby inhibiting atherosclerosis and platelet related cardiovascular disorders.

An Experimental Fault Injection Attack on RSA Cryptosystem using Abnormal Source Voltage (비정상 전원 전압을 이용한 RSA 암호 시스템의 실험적 오류 주입 공격)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.195-200
    • /
    • 2009
  • CRT-based RSA algorithm, which was implemented on smartcard, microcontroller and so on, leakages secret primes p and q by fault attacks using laser injection, EM radiation, ion beam injection, voltage glitch injection and so on. Among the many fault injection methods, voltage glitch can be injected to target device without any modification, so more practical. In this paper, we made an experiment on the fault injection attack using abnormal source voltage. As a result, CRT-RSA's secret prime p and q are disclosed by fault attack with voltage glitch injection which was introduced by several previous papers, and also succeed the fault attack with source voltage blocking for proper period.

INFINITE FAMILIES OF CONGRUENCES MODULO 2 FOR 2-CORE AND 13-CORE PARTITIONS

  • Ankita Jindal;Nabin Kumar Meher
    • Journal of the Korean Mathematical Society
    • /
    • v.60 no.5
    • /
    • pp.1073-1085
    • /
    • 2023
  • A partition of n is called a t-core partition if none of its hook number is divisible by t. In 2019, Hirschhorn and Sellers [5] obtained a parity result for 3-core partition function a3(n). Motivated by this result, both the authors [8] recently proved that for a non-negative integer α, a3αm(n) is almost always divisible by an arbitrary power of 2 and 3 and at(n) is almost always divisible by an arbitrary power of pji, where j is a fixed positive integer and t = pa11pa22···pamm with primes pi ≥ 5. In this article, by using Hecke eigenform theory, we obtain infinite families of congruences and multiplicative identities for a2(n) and a13(n) modulo 2 which generalizes some results of Das [2].

Regulation of CMGC kinases by hypoxia

  • KyeongJin Kim;Sang Bae Lee
    • BMB Reports
    • /
    • v.56 no.11
    • /
    • pp.584-593
    • /
    • 2023
  • Hypoxia, a widespread occurrence observed in various malignant tumors, results from rapid tumor growth that outpaces the oxygen supply. Tumor hypoxia precipitates several effects on tumor biology; these include activating angiogenesis, intensifying invasiveness, enhancing the survival of tumor cells, suppressing anti-tumor immunity, and fostering resistance to therapy. Aligned with the findings that correlate CMGC kinases with the regulation of Hypoxia-Inducible Factor (HIF), a pivotal modulator, reports also indicate that hypoxia governs the activity of CMGC kinases, including DYRK1 kinases. Prolyl hydroxylation of DYRK1 kinases by PHD1 constitutes a novel mechanism of kinase maturation and activation. This modification "primes" DYRK1 kinases for subsequent tyrosine autophosphorylation, a vital step in their activation cascade. This mechanism adds a layer of intricacy to comprehending the regulation of CMGC kinases, and underscores the complex interplay between distinct post-translational modifications in harmonizing precise kinase activity. Overall, hypoxia assumes a substantial role in cancer progression, influencing diverse aspects of tumor biology that include angiogenesis, invasiveness, cell survival, and resistance to treatment. CMGC kinases are deeply entwined in its regulation. To fathom the molecular mechanisms underpinning hypoxia's impact on cancer cells, comprehending how hypoxia and prolyl hydroxylation govern the activity of CMGC kinases, including DYRK1 kinases, becomes imperative. This insight may pave the way for pioneering therapeutic approaches that target the hypoxic tumor microenvironment and its associated challenges.

Effects of word frequency and semantic transparency on decomposition processes of compound nouns (사용빈도와 의미투명도가 복합명사의 분리처리에 미치는 효과)

  • Lee, Tae-Yeon
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.371-398
    • /
    • 2007
  • This study examined effects of word frequency and semantic transparency on decomposition processes of compound nouns by semantic priming task and repetition priming task. In Experiment 1, it was investigated that decomposition process depended on word frequency of compound noun. Semantic priming effects were found In the compound noun's associate rendition consistently, and repetition priming effects were found in the whole rendition as well as in the part condition irrespective of word frequency and SOA. These results implied that compound noun was processed through decomposition process path and direct access path. In Experiment 2, Effects of semantic transparency on decomposition processes of compound nouns were examined. Semantic priming effects were found when compound nouns' associates were presented as primes irrespective of semantic transparency and SOA, and results were the same as experiment 1b in repetition priming task. Results of experiment 1 and 2 implies that compound nouns are interpreted by interactive activation processes of attributes activated by decomposition path and direct access path.

  • PDF

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol

  • Padmavathy, R.;Bhagvati, Chakravarthy
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.335-346
    • /
    • 2010
  • The present study investigates the difficulty of solving the mathematical problem, namely the DLP (Discrete Logarithm Problem) for ephemeral keys. The DLP is the basis for many public key cryptosystems. The ephemeral keys are used in such systems to ensure security. The DLP defined on a prime field $Z^*_p of random prime is considered in the present study. The most effective method to solve the DLP is the ICM (Index Calculus Method). In the present study, an efficient way of computing the DLP for ephemeral keys by using a new variant of the ICM when the factors of p-1 are known and small is proposed. The ICM has two steps, a pre-computation and an individual logarithm computation. The pre-computation step is to compute the logarithms of a subset of a group and the individual logarithm step is to find the DLP using the precomputed logarithms. Since the ephemeral keys are dynamic and change for every session, once the logarithms of a subset of a group are known, the DLP for the ephemeral key can be obtained using the individual logarithm step. Therefore, an efficient way of solving the individual logarithm step based on the newly proposed precomputation method is presented and the performance is analyzed using a comprehensive set of experiments. The ephemeral keys are also solved by using other methods, which are efficient on random primes, such as the Pohlig-Hellman method, the Van Oorschot method and the traditional individual logarithm step. The results are compared with the newly proposed individual logarithm step of the ICM. Also, the DLP of ephemeral keys used in a popular password key exchange protocol known as Chang and Chang are computed and reported to launch key recovery attack.