• 제목/요약/키워드: computational primitive

검색결과 57건 처리시간 0.031초

ON THE DERIVATIVES OF THE VECTOR-VALUED CONTINUOUS FUNCTION

  • Lee, Choon-HO
    • Journal of applied mathematics & informatics
    • /
    • 제23권1_2호
    • /
    • pp.489-496
    • /
    • 2007
  • Let g be a continuous function on an interval I which is not constant on any subinterval of I, and let ${\mu}$ be a Borel measure on I. In this paper we give a necessary and sufficient conditions guaranteeing, for the strongly measurable function f on I with values in a Banach space X, the existence of a continuous primitive function F on I with respect to g.

형상 모델링을 위한 음함수 객체의 설계 및 구현 (The Design and Implementation of Implicit Object Classes for Geometric Modeling System)

  • 박상근;정성엽
    • 한국CDE학회논문집
    • /
    • 제13권3호
    • /
    • pp.187-199
    • /
    • 2008
  • This paper describes a C++ class hierarchy of implicit objects for geometry modeling and processing. This class structure provides a software kernel for integrating many various models and methods found in current implicit modeling areas. The software kernel includes primitive objects playing a role of unit element in creating a complex shape, and operator objects used to construct more complex shape of implicit object formed with the primitive objects and other operators. In this paper, class descriptions of these objects are provided to better understand the details of the algorithm or implementation, and its instance examples to show the capabilities of the object classes for constructive shape geometry. In addition, solid modeling system shown as an application example demonstrates that the proposed implicit object classes allow us to carry out modern solid modeling techniques, which means they have the capabilities to extend to various applications.

다차원 디지탈 필터의 VLSI 구조 (A VLSI architecture for the multi-dimensional digital filter)

  • 정재길;김용호
    • 자연과학논문집
    • /
    • 제8권2호
    • /
    • pp.69-75
    • /
    • 1996
  • 다차원 디지탈 필터링 알고리즘을 실시간에 처리할 수 있는 효율적인 시스템 구현을 위한 VLSI 구조를 제안하였다. 다차원 디지탈 필터링 알고리즘에 내재된 병렬성을 상태공간식을 이용하여 추출하여, 이를 프로세서 설계에 사용함으로써 보다 효율적인 다차원 디지탈 필터의 실시간 구현을 기능하게 하였다.

  • PDF

A COUNTER-BASED MAC REVISITED: WEAKENING THE UNDERLYING ASSUMPTION

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Journal of applied mathematics & informatics
    • /
    • 제24권1_2호
    • /
    • pp.461-470
    • /
    • 2007
  • In CRYPTO 1995, Bellare, $Gu\'{e}rin$, and Rogaway proposed a very efficient message authentication scheme. This scheme is secure against adaptive chosen message attacks, under the assumption that its underlying primitive is a pseudorandom function. This article studies how to weaken that assumption. For an adaptive chosen message attack, we take into account two scenarios. On the one hand, the adversary intercepts the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier does not receive them. On the other hand, the adversary can only eavesdrop the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier receives them. We modify the original scheme. In the first scenario, our scheme is secure if the underlying primitive is a pseudorandom function. In the second scenario, our scheme is still secure under a weaker assumption that the underlying primitive is an indistinguishable-uniform function.

비압축성 2-D 유동에 대한 와도-흐름함수 방정식의 유한요소 근사 (FE Approximation of the Vorticity-Stream function Equations for Incompressible 2-D flows)

  • Pak, Seong-Kwan;Kim, Do-Wan;Kweon, Young Cheol
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2003년도 가을 학술발표회 논문집
    • /
    • pp.437-443
    • /
    • 2003
  • The object of this paper is the treatment of how to make the vorticity boundary condition instead of pressure in the primitive variable case. An improved algorithm for solving the vorticity-stream function equation is presented. The linear finite element approximation for the solution of Wavier-Stokes and Stokes flows is constructed. Not only regular domain but also complicate domain can be analyze d, using this formulation.

  • PDF

ON FINITE GROUPS WITH A CERTAIN NUMBER OF CENTRALIZERS

  • REZA ASHRAFI ALI;TAERI BIJAN
    • Journal of applied mathematics & informatics
    • /
    • 제17권1_2_3호
    • /
    • pp.217-227
    • /
    • 2005
  • Let G be a finite group and $\#$Cent(G) denote the number of centralizers of its elements. G is called n-centralizer if $\#$Cent(G) = n, and primitive n-centralizer if $\#$Cent(G) = $\#$Cent($\frac{G}{Z(G)}$) = n. In this paper we investigate the structure of finite groups with at most 21 element centralizers. We prove that such a group is solvable and if G is a finite group such that G/Z(G)$\simeq$$A_5$, then $\#$Cent(G) = 22 or 32. Moreover, we prove that As is the only finite simple group with 22 centralizers. Therefore we obtain a characterization of As in terms of the number of centralizers

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • 제39권1호
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

EXTRAPOLATED CRANK-NICOLSON APPROXIMATION FOR A LINEAR STEFAN PROBLEM WITH A FORCING TERM

  • Ahn, Min-Jung;Lee, Hyun-Young
    • Journal of applied mathematics & informatics
    • /
    • 제8권3호
    • /
    • pp.773-793
    • /
    • 2001
  • The explicit expressions for the 2n+1 primitive idempotents in R/sub pⁿ/ = F[x]/< x/sup pⁿ/ -1>, where F is the field of prime power order q and the multiplicative order of q modulo pⁿ is ø(pⁿ)/2(n≥1 and p is an odd prime), are obtained. An algorithm for computing the generating polynomials of the minimal QR cyclic codes of length pⁿ, generated by these primitive idempotents, is given and hence some bounds on the minimum distance of some QR codes of prime length over GF(q)(q=2, 3, ...) are obtained.