• Title/Summary/Keyword: String

Search Result 1,090, Processing Time 0.031 seconds

Mechanical Properties of Silk Gayageum Strings on the Twisting Conditions (명주실 현의 꼬임수에 따른 특성)

  • Kim Young Dae;Choi Tea Jin;Woo Soon Ok;Yi Ji-Yong
    • Journal of Sericultural and Entomological Science
    • /
    • v.46 no.1
    • /
    • pp.38-43
    • /
    • 2004
  • The strings of Gayageum and Geomungo are usually made of raw silk. It needs good vibration as well as good durability to endure during play the Gayagum and Geomungo. This study was carried out to discuss some effects of twisting number of first and final twisting on the mechanical properties of silk Gayageum strings. Tenacity of strings were largely decreased proportionally with the increase of number of twisting of strings but elongation of strings were in the opposition direction. However, it was needed to hard twisting string for the good vibration. The proper S direction twisting velocity of moving twister during final twisting (Z direction) until three thread become one thread, was 40% of basic twister.

Fingerprint Matching Algorithm using MHC Detector Set of String Structure (스트링 구조의 MHC 인식부를 이용한 지문 매칭알고리즘)

  • Sim, Kwee-Bo;Jeong, Jae-Won;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.279-284
    • /
    • 2004
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Recently, the speed of identification becomes a very important point in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. In this paper, we propose the fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system. The proposed algorithm is organized by two-matching stage. The 1st matching stage does the matching process by the use of the 'self-space' and MHC detector string set that are generated from the minutiae and the values of the directional field. Then the 2nd matching stage is made based on the local-structure of the minutiae. The proposed two matching stage reduces matching time while the reliability of the matching algorithm is maintained.

Key Recovery Algorithm of Erroneous RSA Private Key Bits Using Generalized Probabilistic Measure (일반화된 확률 측도를 이용하여 에러가 있는 RSA 개인키를 복구하는 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1089-1097
    • /
    • 2016
  • It is well-known that, if additional information other than a plaintext-ciphertext pair is available, breaking the RSA cryptosystem may be much easier than factorizing the RSA modulus. For example, Coppersmith showed that, given the 1/2 fraction of the least or most significant bits of one of two RSA primes, the RSA modulus can be factorized in a polynomial time. More recently, Henecka et. al showed that the RSA private key of the form (p, q, d, $d_p$, $d_q$) can efficiently be recovered whenever the bits of the private key are erroneous with error rate less than 23.7%. It is notable that their algorithm is based on counting the matching bits between the candidate key bit string and the given decayed RSA private key bit string. And, extending the algorithm, this paper proposes a new RSA private key recovery algorithm using a generalized probabilistic measure for measuring the consistency between the candidate key bits and the given decayed RSA private key bits.

Implementation of VLC transceiver module using USB OTG (USB OTG를 이용한 VLC 송·수신 모듈 구현)

  • Lee, Jong-Sung;Lee, Dae-Hee;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.668-670
    • /
    • 2017
  • Visible Light Communication, which is promising as a next generation near field wireless communications, has been increased study and application case due to the development of LED technology. However, there are few application cases to IoT service due to the necessity of separate equipment for communication and limitation of light transmission to obstacles. In this paper, it propose a portable VLC transceiver module that can be connected to USB OTG and dedicated application for control to realization position possible necessary technique. The string input from the dedicated application is sent to the VLC module via USB OTG to transmit and receive data between the modules. As string transmission experiment result, it is confirmed that ASCII code transmission between VLC transceiver modules is possible through control of the implemented dedicated application.

  • PDF

Approximate Periods of Strings based on Distance Sum for DNA Sequence Analysis (DNA 서열분석을 위한 거리합기반 문자열의 근사주기)

  • Jeong, Ju Hui;Kim, Young Ho;Na, Joong Chae;Sim, Jeong Seop
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.119-122
    • /
    • 2013
  • Repetitive strings such as periods have been studied vigorously in so diverse fields as data compression, computer-assisted music analysis, bioinformatics, and etc. In bioinformatics, periods are highly related to repetitive patterns in DNA sequences so called tandem repeats. In some cases, quite similar but not the same patterns are repeated and thus we need approximate string matching algorithms to study tandem repeats in DNA sequences. In this paper, we propose a new definition of approximate periods of strings based on distance sum. Given two strings $p({\mid}p{\mid}=m)$ and $x({\mid}x{\mid}=n)$, we propose an algorithm that computes the minimum approximate period distance based on distance sum. Our algorithm runs in $O(mn^2)$ time for the weighted edit distance, and runs in O(mn) time for the edit distance, and runs in O(n) time for the Hamming distance.

Kinematic Skill Analysis of the Turn Motion and Release Phase in Female Hammer Throw (여자해머던지기 턴 동작과 투사국면에 대한 운동학적 기술 요인 분석)

  • Chung, Nam-Ju;Kim, Jae-Pil;Song, Ok-Heung
    • Korean Journal of Applied Biomechanics
    • /
    • v.20 no.4
    • /
    • pp.429-436
    • /
    • 2010
  • The purpose of this study was to analyze the kinematic factors and throwing variables for the 3-turn and 4-turn techniques and for release as well as to provide technical advice for improving athletic performance in hammer throwing. Data analysis led to the following conclusions: To increase the rotation speed for the 3-turn and 4-turn techniques, the time elapsed during the 1-foot support period should be decreased the distance between the rotating foot and the rotation axis should be small and the height of the hip joint should be increased at the times of release The throwing angle at the moment of release should be more than 40 degrees, and the throwing position should be taken vertically high at the shoulder joints. To accelerate the motion of the hammer, the speed should not be reduced during the 1-foot support period but should be increased during the 2-foot support period for much greater acceleration. In the 3-turn technique, the angles of the shoulder axis and hummer string should be dragged angle at the maximum point and lead angle at the minimum point, and dragged angle at the maximum and minimum points in the 4-turn at the time of relase The upper body should be quickly bent backward, the knee angle should be extended, and the angles of the shoulder axis and hammer string should be dragged angle close to 90 degrees.

Improvement of Runtime Intrusion Prevention Evaluator (RIPE) (실행시간 침입 방지 평가 프로그램(RIPE)의 개선)

  • Lee, Hyungyu;Lee, Damho;Kim, Taehwan;Cho, Donghwang;Lee, Sanghoon;Kim, Hoonkyu;Pyo, Changwoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1049-1056
    • /
    • 2015
  • Runtime Intrusion Prevention Evaluator (RIPE), published in 2011, is a benchmark suite for evaluating mitigation techniques against 850 attack patterns using only buffer overflow. Since RIPE is built as a single process, defense and attack routines cannot help sharing process states and address space layouts when RIPE is tested. As a result, attack routines can access the memory space for defense routines without restriction. We separate RIPE into two independent processes of defense and attacks so that mitigations based on confidentiality such as address space layout randomization are properly evaluated. In addition, we add an execution mode to test robustness against brute force attacks. Finally, we extend RIPE by adding 38 attack forms to perform format string attacks and virtual table (vtable) hijacking attacks. The revised RIPE contributes to the diversification of attack patterns and precise evaluation of the effectiveness of mitigations.

Construction of Linearly Aliened Corpus Using Unsupervised Learning (자율 학습을 이용한 선형 정렬 말뭉치 구축)

  • Lee, Kong-Joo;Kim, Jae-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.387-394
    • /
    • 2004
  • In this paper, we propose a modified unsupervised linear alignment algorithm for building an aligned corpus. The original algorithm inserts null characters into both of two aligned strings (source string and target string), because the two strings are different from each other in length. This can cause some difficulties like the search space explosion for applications using the aligned corpus with null characters and no possibility of applying to several machine learning algorithms. To alleviate these difficulties, we modify the algorithm not to contain null characters in the aligned source strings. We have shown the usability of our approach by applying it to different areas such as Korean-English back-trans literation, English grapheme-phoneme conversion, and Korean morphological analysis.

Effect of motion path of downburst on wind-induced conductor swing in transmission line

  • Lou, Wenjuan;Wang, Jiawei;Chen, Yong;Lv, Zhongbin;Lu, Ming
    • Wind and Structures
    • /
    • v.23 no.3
    • /
    • pp.211-229
    • /
    • 2016
  • In recent years, the frequency and duration of supply interruption in electric power transmission system due to flashover increase yearly in China. Flashover is usually associated with inadequate electric clearance and often takes place in extreme weathers, such as downbursts, typhoons and hurricanes. The present study focuses on the wind-induced oscillation of conductor during the process when a downburst is passing by or across a specified transmission line. Based on a revised analytical model recently developed for stationary downburst, transient three-dimensional wind fields of moving downbursts are successfully simulated. In the simulations, the downbursts travel along various motion paths according to the certain initial locations and directions of motion assumed in advance. Then, an eight-span section, extracted from a practical 500 kV ultra-high-voltage transmission line, is chosen. After performing a non-linear transient analysis, the transient displacements of the conductors could be obtained. Also, an extensive study on suspension insulator strings' rotation angles is conducted, and the electric clearances at different strings could be compared directly. The results show that both the variation trends of the transient responses and the corresponding peak values vary seriously with the motion paths of downburst. Accordingly, the location of the specified string, which is in the most disadvantageous situation along the studied line section, is picked out. And a representative motion path is concluded for reference in the calculation of each string's oscillation for the precaution of wind-induced flashover under downburst.

Keyword Retrieval-Based Korean Text Command System Using Morphological Analyzer (형태소 분석기를 이용한 키워드 검색 기반 한국어 텍스트 명령 시스템)

  • Park, Dae-Geun;Lee, Wan-Bok
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.159-165
    • /
    • 2019
  • Based on deep learning technology, speech recognition method has began to be applied to commercial products, but it is still difficult to be used in the area of VR contents, since there is no easy and efficient way to process the recognized text after the speech recognition module. In this paper, we propose a Korean Language Command System, which can efficiently recognize and respond to Korean speech commands. The system consists of two components. One is a morphological analyzer to analyze sentence morphemes and the other is a retrieval based model which is usually used to develop a chatbot system. Experimental results shows that the proposed system requires only 16% commands to achieve the same level of performance when compared with the conventional string comparison method. Furthermore, when working with Google Cloud Speech module, it revealed 60.1% of success rate. Experimental results show that the proposed system is more efficient than the conventional string comparison method.