Suppose that G is a group of permutations of a set ${\Omega}$. For a finite subset ${\gamma}$of${\Omega}$, the movement of ${\gamma}$ under the action of G is defined as move(${\gamma}$):=$max\limits_{g{\epsilon}G}|{\Gamma}^{g}{\backslash}{\Gamma}|$, and ${\gamma}$ will be said to have restricted movement if move(${\gamma}$)<|${\gamma}$|. Moreover if, for an infinite subset ${\gamma}$of${\Omega}$, the sets|{\Gamma}^{g}{\backslash}{\Gamma}| are finite and bounded as g runs over all elements of G, then we may define move(${\gamma}$)in the same way as for finite subsets. If move(${\gamma}$)${\leq}$m for all ${\gamma}$${\subseteq}$${\Omega}$, then G is said to have bounded movement and the movement of G move(G) is defined as the maximum of move(${\gamma}$) over all subsets ${\gamma}$ of ${\Omega}$. Having bounded movement is a very strong restriction on a group, but it is natural to ask just which permutation groups have bounded movement m. If move(G)=m then clearly we may assume that G has no fixed points is${\Omega}$, and with this assumption it was shown in [4, Theorem 1]that the number t of G=orbits is at most 2m-1, each G-orbit has length at most 3m, and moreover|${\Omega}$|${\leq}$3m+t-1${\leq}$5m-2. Moreover it has recently been shown by P. S. Kim, J. R. Cho and C. E. Praeger in [1] that essentially the only examples with as many as 2m-1 orbits are elementary abelian 2-groups, and by A. Gardiner, A. Mann and C. E. Praeger in [2,3]that essentially the only transitive examples in a set of maximal size, namely 3m, are groups of exponent 3. (The only exceptions to these general statements occur for small values of m and are known explicitly.) Motivated by these results, we would decide what role if any is played by primes other that 2 and 3 for describing the structure of groups of bounded movement.
Journal of the Korea Institute of Information Security & Cryptology
/
v.26
no.5
/
pp.1089-1097
/
2016
It is well-known that, if additional information other than a plaintext-ciphertext pair is available, breaking the RSA cryptosystem may be much easier than factorizing the RSA modulus. For example, Coppersmith showed that, given the 1/2 fraction of the least or most significant bits of one of two RSA primes, the RSA modulus can be factorized in a polynomial time. More recently, Henecka et. al showed that the RSA private key of the form (p, q, d, $d_p$, $d_q$) can efficiently be recovered whenever the bits of the private key are erroneous with error rate less than 23.7%. It is notable that their algorithm is based on counting the matching bits between the candidate key bit string and the given decayed RSA private key bit string. And, extending the algorithm, this paper proposes a new RSA private key recovery algorithm using a generalized probabilistic measure for measuring the consistency between the candidate key bits and the given decayed RSA private key bits.
Field surveys were conducted in 45 stone fruit orchards in seven districts of Isparta Province located in western Mediterranean region of Turkey important for stone fruit production. Leaf samples were collected from 175 trees showing virus-like symptoms. These samples were first tested by ELISA for five different RNA viruses including Apple mosaic ilarvirus (ApMV), Prunus necrotic ringspot ilarvirus (PNRSV), Prune dwarf ilarvirus (PDV), Plum pox potyvirus (PPV), Apple chlorotic leafspot trichovirus (ACLSV). While no ApMV and PPV infection was found, 46, 24 and 16 samples were tested positive for PDV, ACLSV and PNRSV, respectively, in ELISA showing about 45% of symptomatic trees in the region were infected with at least one of these viruses. In addition, it was found that nine sweet cherry trees were mixed infected with two or three of these viruses and PDV with an infection rate of 26.3% was the most widespread virus in symptomatic trees in western Mediterranean region. Thirty samples were selected and tested by a multiplex RT-PCR (mRT-PCR) for simultaneous detection of these viruses. While PPV was not detected, more than half of the tested 20 samples were individually or mixed infected with ApMV, ACLSV, PNRSV and PDV. The mRT-PCR results were confirmed by detection of these viruses individually in some of the field samples using RT-PCR with primes specific to each virus. Comparison of ELSA and mRT-PCR results of 30 samples showed that numbers of infected and mixed infected samples as well as infection and mixed infection rates were significantly higher in RT-PCR (20 and 66.7%) than in ELISA (14 and 46.7%). The results confirm that mRT-PCR is more sensitive than ELISA.
Noh, Seong Woo;Seo, Rira;Park, Jung-Kwon;Manir, Md. Maniruzzaman;Park, Kyungseok;Sang, Mee Kyung;Moon, Surk-Sik;Jung, Ho Won
The Plant Pathology Journal
/
v.33
no.4
/
pp.402-409
/
2017
Cyclic dipeptides (CDPs) are one of the simplest compounds produced by living organisms. Plant-growth promoting rhizobacteria (PGPRs) also produce CDPs that can induce disease resistance. Bacillus vallismortis strain BS07 producing various CDPs has been evaluated as a potential biocontrol agent against multiple plant pathogens in chili pepper. However, plant signal pathway triggered by CDPs has not been fully elucidated yet. Here we introduce four CDPs, cyclo(Gly-L-Pro) previously identified from Aspergillus sp., and cyclo(L-Ala-L-Ile), cyclo(L-Ala-L-Leu), and cyclo(L-Leu-L-Pro) identified from B. vallismortis BS07, which induce disease resistance in Arabidopsis against Pseudomonas syringae infection. The CDPs do not directly inhibit fungal and oomycete growth in vitro. These CDPs require PHYTOALEXIN DEFICIENT4, SALICYLIC ACID INDUCTION DEFICIENT2, and NONEXPRESSOR OF PATHOGENESIS-RELATED PROTEINS1 important for salicylic acid-dependent defense to induce resistance. On the other hand, regulators involved in jasmonate-dependent event, such as ETHYLENE RECEPTOR1, JASMONATE RESPONSE1, and JASMONATE INSENSITIVE1, are necessary to the CDP-induced resistance. Furthermore, treatment of these CDPs primes Arabidopsis plants to rapidly express PATHOGENESIS-RELATED PROTEIN4 at early infection phase. Taken together, we propose that these CDPs from PGPR strains accelerate activation of jasmonate-related signaling pathway during infection.
In order to help students to understand the essence of prime concepts, this study looked at the history of prime concept development and analyzed how to introduce the concept of textbooks. In ancient Greece, primes were multiplicative atoms. At that time, the unit was not a number, but the development of decimal representations led to the integration of the unit into the number, which raised the issue of primality of 1. Based on the uniqueness of factorization into prime factor, 1 was excluded from the prime, and after that, the concept of prime of the atomic context and the irreducible concept of the divisor context are established. The history of the development of prime concepts clearly reveals that the fact that prime is the multiplicative atom is the essence of the concept. As a result of analyzing the textbooks, the textbook has problems of not introducing the concept essence by introducing the concept of prime into a shaped perspectives or using game, and the problem that the transition to analytic concept definition is radical after the introduction of the concept. Based on the results of the analysis, we have provided several pedagogical implications for helping to focus on a conceptual aspect of prime number.
Background and Objectives: In distracting listening conditions, individuals need to pay extra attention to selectively listen to the target sounds. To investigate the amount of listening effort required in reverberating and noisy backgrounds, a semantic mismatch was examined. Subjects and Methods: Electroencephalography was performed in 18 voluntary healthy participants using a 64-channel system to obtain N400 latencies. They were asked to listen to sounds and see letters in 2 reverberated×2 noisy paradigms (i.e., Q-0 ms, Q-2000 ms, 3 dB-0 ms, and 3 dB-2000 ms). With auditory-visual pairings, the participants were required to answer whether the auditory primes and letter targets did or did not match. Results: Q-0 ms revealed the shortest N400 latency, whereas the latency was significantly increased at 3 dB-2000 ms. Further, Q-2000 ms showed approximately a 47 ms delayed latency compared to 3 dB-0 ms. Interestingly, the presence of reverberation significantly increased N400 latencies. Under the distracting conditions, both noise and reverberation involved stronger frontal activation. Conclusions: The current distracting listening conditions could interrupt the semantic mismatch processing in the brain. The presence of reverberation, specifically a 2000 ms delay, necessitates additional mental effort, as evidenced in the delayed N400 latency and the involvement of the frontal sources in this study.
Background and Objectives: In distracting listening conditions, individuals need to pay extra attention to selectively listen to the target sounds. To investigate the amount of listening effort required in reverberating and noisy backgrounds, a semantic mismatch was examined. Subjects and Methods: Electroencephalography was performed in 18 voluntary healthy participants using a 64-channel system to obtain N400 latencies. They were asked to listen to sounds and see letters in 2 reverberated×2 noisy paradigms (i.e., Q-0 ms, Q-2000 ms, 3 dB-0 ms, and 3 dB-2000 ms). With auditory-visual pairings, the participants were required to answer whether the auditory primes and letter targets did or did not match. Results: Q-0 ms revealed the shortest N400 latency, whereas the latency was significantly increased at 3 dB-2000 ms. Further, Q-2000 ms showed approximately a 47 ms delayed latency compared to 3 dB-0 ms. Interestingly, the presence of reverberation significantly increased N400 latencies. Under the distracting conditions, both noise and reverberation involved stronger frontal activation. Conclusions: The current distracting listening conditions could interrupt the semantic mismatch processing in the brain. The presence of reverberation, specifically a 2000 ms delay, necessitates additional mental effort, as evidenced in the delayed N400 latency and the involvement of the frontal sources in this study.
The scaled inverse of a nonzero element a(x) ∈ ℤ[x]/f(x), where f(x) is an irreducible polynomial over ℤ, is the element b(x) ∈ ℤ[x]/f(x) such that a(x)b(x) = c (mod f(x)) for the smallest possible positive integer scale c. In this paper, we investigate the scaled inverse of (xi - xj) modulo cyclotomic polynomial of the form Φps (x) or Φpsqt (x), where p, q are primes with p < q and s, t are positive integers. Our main results are that the coefficient size of the scaled inverse of (xi - xj) is bounded by p - 1 with the scale p modulo Φps (x), and is bounded by q - 1 with the scale not greater than q modulo Φpsqt (x). Previously, the analogous result on cyclotomic polynomials of the form Φ2n (x) gave rise to many lattice-based cryptosystems, especially, zero-knowledge proofs. Our result provides more flexible choice of cyclotomic polynomials in such cryptosystems. Along the way of proving the theorems, we also prove several properties of {xk}k∈ℤ in ℤ[x]/Φpq(x) which might be of independent interest.
This study investigated the lexical access processing of inflected Korean verbs in the mental lexicon. In Korean, verbs can be classified into two main types of inflections, which are regular and irregular inflections, which can be further divided into three types of regular inflections and two types of irregular inflections. A masked priming lexical decision task was used and the priming effects were compared. Experiments were carried out using the five different types of verbal inflections in Korean: (1) No change-regularity (regular verbs with no orthographical or phonological changes), (2) Phonological change-regularity (regular verbs with phonological changes to the stem only), (3) Orthographical change-regularity (regular verbs that only undergo orthographical changes), (4) Stem change-irregularity (the stem is omitted or alternated with the other phoneme of the stem in irregular verbs), (5) Ending change-irregularity (irregular verbs with changes in the endings by phoneme substitution). The first three types are regarded as regular verbal inflections whereas the latter two types are regarded as irregular verbal inflections. The infinitive forms of the verb were presented as target words and three different conditions were presented as prime words. The three conditions included regular verbal inflection, irregular verbal inflection, and a control condition in which morphologically and semantically unrelated primes were presented. In addition, different stimulus onset asynchrony (SOA) were manipulated (43ms, 72ms, 230ms) to examine the time frame of the morphological decomposition process in word recognition. The results revealed that there were significant priming effects in all three SOAs across conditions. Hence, there was no significant differences in priming effects between regular and irregular verbal inflection conditions. This may suggest that Korean verb processing does not adopt different processing routes for regular and irregular inflections, which can also be an indication of earlier morphological information processing for Korean verbs.
Temperature and weather are all around us, quite literally. Furthermore, temperature and weather not only permeate our atmosphere, constantly affecting our visceral states of warmth and coldness, but they metaphorically permeate our language. People, products, and ideas can all be "hot" or "cold." Given this ubiquity, it is perhaps surprising that relatively little research has systematically examined the influence of temperature on choice and judgment. Temperature-related words such as "hot" and "cold" are often used to describe impulsive and calculated behaviors, respectively. These metaphoric connotations of thermal concepts raise the question as to whether temperature, psychological states and decision making are related to each other, and if so, how. The current research examines these questions and finds support for a relationship. Across one field study and one laboratory experiment, I demonstrate that both hot ambient room temperature (Spa) and hot temperature primes (words) trigger decision outcomes in line with the metaphoric association between hot temperature and impulsivity. In the field study, participants were recruited in hot (40-50 degrees Celsius) and cold (10 degrees Celsius) rooms at a spa. Participants were simply asked to indicate their willingness-to-pay (WTP) for three product categories (travel package, birthday dinner, and cell phone). The results showed that participants in the hot room in comparison to those in the cold room were willing to pay more for the same products. Next, I tested if our results would go beyond ambient temperature and would hold if I were to prime temperature concepts by using a different priming method (i.e., subliminal vs. supraliminal). In line with the previous findings in the spa, participants in the hot priming condition were more likely to choose the wrong answer for the bat and baseball question than those in the cold priming condition. In addition, product type (e.g., pleasure vs. necessity) can moderate the effect of hot temperature on impulsivity. Mood and arousal did not mediate participants' responses. My findings seem to suggest that the effects of temperature on decision outcomes can be attributed to metaphoric associations rather than incidental mood or arousal. The current research applies a novel perspective in understanding the relationship between temperature and judgment and decision making. Also, the results have practical implications for packaging, advertising, merchandising, and pricing of goods and services, as well as for public policy and awareness. One of the most natural implications of my findings would be that retailers would be better off carrying more impulse purchase items on hot days. Furthermore, point-of-purchase promotions encouraging impulse purchase is more likely to be effective in retail environments with higher temperature than with lower temperature. In addition, advertisements and product packages evoking hot temperature associations (e.g., beach, sunshine, summer) might lead consumers to pay higher price for the advertised product than those with cold temperature associations.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.