• Title/Summary/Keyword: Substitution Probability

Search Result 18, Processing Time 0.027 seconds

Prediction of the Probability of Job Loss due to Digitalization and Comparison by Industry: Using Machine Learning Methods

  • Park, Heedae;Lee, Kiyoul
    • Journal of Korea Trade
    • /
    • v.25 no.5
    • /
    • pp.110-128
    • /
    • 2021
  • Purpose - The essential purpose of this study is to analyze the possibility of substitution of an individual job resulting from technological development represented by the 4th Industrial Resolution, considering the different effects of digital transformation on the labor market. Design/methodology - In order to estimate the substitution probability, this study used two data sets which the job characteristics data for individual occupations provided by KEIS and the information on occupational status of substitution provided by Frey and Osborne(2013). In total, 665 occupations were considered in this study. Of these, 80 occupations had data with labels of substitution status. The primary goal of estimation was to predict the degree of substitution for 607 of 665 occupations (excluding 58 with markers). It utilized three methods a principal component analysis, an unsupervised learning methodology of machine learning, and Ridge and Lasso from supervised learning methodology. After extracting significant variables based on the three methods, this study carried out logistics regression to estimate the probability of substitution for each occupation. Findings - The probability of substitution for other occupational groups did not significantly vary across individual models, and the rank order of the probabilities across occupational groups were similar across models. The mean of three methods of substitution probability was analyzed to be 45.3%. The highest value was obtained using the PCA method, and the lowest value was derived from the LASSO method. The average substitution probability of the trading industry was 45.1%, very similar to the overall average. Originality/value - This study has a significance in that it estimates the job substitution probability using various machine learning methods. The results of substitution probability estimation were compared by industry sector. In addition, This study attempts to compare between trade business and industry sector.

Highly dispersive substitution box (S-box) design using chaos

  • Faheem, Zaid Bin;Ali, Asim;Khan, Muhamad Asif;Ul-Haq, Muhammad Ehatisham;Ahmad, Waqar
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.619-632
    • /
    • 2020
  • Highly dispersive S-boxes are desirable in cryptosystems as nonlinear confusion sublayers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S-box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S-box. The proposed scheme is vetted using well-established cryptographic performance criteria. The proposed S-box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S-box is also tested using an image encryption algorithm. Results show that the proposed S-box as a confusion component entails a high level of security and improves resistance against all known attacks.

Real-Time Foreground Segmentation and Background Substitution for Protecting Privacy on Visual Communication (화상 통신에서의 사생활 보호를 위한 실시간 전경 분리 및 배경 대체)

  • Bae, Gun-Tae;Kwak, Soo-Yeong;Byun, Hye-Ran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5C
    • /
    • pp.505-513
    • /
    • 2009
  • This paper proposes a real-time foreground segmentation and background substitution method for protecting the privacy on visual communication. Previous works on this topic have some problems with the color and shape of foreground and the capture device such as stereo camera. we provide a solution which can segment the foreground in real-time using fixed mono camera. For improving the performance of a foreground extraction, we propose the Temporal Foreground Probability Model (TFPM) by modeling temporal information of a video. Also we provide an boundary processing method for natural and smooth synthesizing that using alpha matte and simple post-processing method.

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • v.23 no.4
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF

A Study on Teaching Continuous Probability Distribution in Terms of Mathematical Connection (수학적 연결성을 고려한 연속확률분포단원의 지도방안 연구)

  • Hwang, Suk-Geun;Yoon, Jeong-Ho
    • School Mathematics
    • /
    • v.13 no.3
    • /
    • pp.423-446
    • /
    • 2011
  • In school mathematics, concepts of definite integral and integration by substitution have mathematical connection with introduction of probability density function, expectation of continuous random variable, and standardization of normal distribution. However, we have difficulty in finding mathematical connection between integration and continuous probability distribution in the curriculum manual, 13 kinds of 'Basic Calculus and Statistics' and 10 kinds of 'Integration and Statistics' authorized textbooks, and activity books applied to the revised curriculum. Therefore, the purpose of this study is to provide a teaching method connected with mathematical concepts of integral in regard to three concepts in continuous probability distribution chapter-introduction of probability density function, expectation of continuous random variable, and standardization of normal distribution. To find mathematical connection between these three concepts and integral, we analyze a survey of student, the revised curriculum manual, authorized textbooks, and activity books as well as 13 domestic and 22 international statistics (or probability) books. Developed teaching method was applied to actual classes after discussion with a professional group. Through these steps, we propose the result by making suggestions to revise curriculum or change the contents of textbook.

  • PDF

A Fast Algorithm for evaluating the Security of Substitution and Permutation Networks against Differential attack and Linear attack (SPN구조 블록 암호의 차분 공격 및 선형 공격에 대한 안전성을 측정하는 고속 알고리즘)

  • 박상우;지성택;박춘식;성수학
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.45-52
    • /
    • 2001
  • In this paper, we examine the method for evaluating the security of SPN structures against differential cryptanalysis and linear cryptanalysis. We present an example of SPN structures in which there is a considerable difference between the differential probabilities and the characteristic probabilities. Then we 7pose an algorithm for estimating the maximum differential probabilities and the maximum linear hull probabilities of SPN structures and an useful method for accelerating the proposed algorithm. By using this method, we obain the maximum differential probabilities and the maximum linear probabilities of round function F of block cipher E2.

On a Reduced-Complexity Inner Decoder for the Davey-MacKay Construction

  • Jiao, Xiaopeng;Armand, M.A.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.637-640
    • /
    • 2012
  • The Davey-MacKay construction is a promising concatenated coding scheme involving an outer $2^k$-ary code and an inner code of rate k/n, for insertion-deletion-substitution channels. Recently, a lookup table (LUT)-based inner decoder for this coding scheme was proposed to reduce the computational complexity of the inner decoder, albeit at the expense of a slight degradation in word error rate (WER) performance. In this letter, we show that negligible deterioration in WER performance can be achieved with an LUT as small as $7{\cdot}2^{k+n-1}$, but no smaller, when the probability of receiving less than n-1 or greater than n+1 bits corresponding to one outer code symbol is at least an order of magnitude smaller than the WER when no LUT is used.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Study on the Market Competitive Structure among Mobile Multimedia Services - Based on the Consumer Choice Model - (소비자 선택확률 모형을 애용한 신규 이동 멀티미디어 서비스군 시장경쟁구조 분석)

  • Jeon, Hyo-Ri;Shin, Yong-Hee;Choi, Mun-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.900-908
    • /
    • 2006
  • This paper studied on the future market competitive structure among mobile multimedia services that offer a variety of multimedia services and contents through wireless networks. In the past, forecasting methods based on market data would be used popularly in telecommunications industry. However, methods must focus on not market data but customer preferences. In this reason, paper use to forecast the market competitive structure and offer firm strategies and policies using a customer choice probability model.

Sequence diversity of Mitochondrial DNA HV1 in Korean population (한국인 집단의 미토콘드리아 DNA HV1 부위에서의 염기서열 다양성)

  • Lim, Si-Keun;Kim, Eung-Su;Kim, Soon-Hee;Park, Ki-Won;Han, Myun-Soo
    • Analytical Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.362-367
    • /
    • 2005
  • The human mitochondrial genome (mtDNA) has been an important tool in the field of forensic investigations. Within the entire mtDNA molecule, the non-coding control region which is approximately 1,100 bp including hypervariable region I and II (HV1 and HV2) is widely studied because it is highly polymorphic and useful for human identification purposes. In this study, 360 unrelated Koreans were analyzed in HV1. The number of polymorphic sites and genetic lineage were 124 and 210, respectively. The most prevalent substitution was C-T and 75.8% of DNA showed C-T substitution at 16223. There were 20 kinds of polymorphism between 16180 and 16193 including insertion and deletion. The most frequent haplotype was [16223T, 16362C] representing 5%. Approximately 25.9% of DNA showed the same haplotype in at least two samples. The gene diversity was calculated to 0.996 and the probability of two unrelated perosons having the same haplotype was determined to 0.7%.