• Title/Summary/Keyword: hyper method

Search Result 386, Processing Time 0.026 seconds

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

The Analysis of Changes in East Coast Tourism using Topic Modeling (토핑 모델링을 활용한 동해안 관광의 변화 분석)

  • Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.489-495
    • /
    • 2020
  • The amount of data is increasing through various IT devices in a hyper-connected society where the 4th revolution is progressing, and new value can be created by analyzing that data. This paper was collected total 1,526 articles from 2017 to 2019 in central magazines, economic magazines, regional associations, and major broadcasting companies with the keyword "(East Coast Tourism or East Coast Travel) and Gangwon-do" through Bigkinds. It was performed the topic modeling using LDA algorithm implemented in the R language to analyze the collected 1,526 articles. It was extracted keywords for each year from 2017 to 2019, and classified and compared keywords with high frequency for each year. It was setted the optimal number of topics to 8 using Log Likelihood and Perplexity, and then inferred 8 topics using the Gibbs Sampling method. The inferred topics were Gangneung and Beach, Goseong and Mt.Geumgang, KTX and Donghae-Bukbu line, weekend sea tour, Sokcho and Unification Observatory, Yangyang and Surfing, experience tour, and transportation network infra. The changes of articles on East coast tourism was was analyzed using the proportion of the inferred eight topics. As the result, the proportion of Unification Observatory and Mt. Geumgang showed no significant change, the proportion of KTX and experience tour increased, and the proportion of other topics decreased in 2018 compared to 2017. In 2019, the proportion of KTX and experience tour decreased, but the proportion of other topics showed no significant change.

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

The Fault Diagnosis Model of Ship Fuel System Equipment Reflecting Time Dependency in Conv1D Algorithm Based on the Convolution Network (합성곱 네트워크 기반의 Conv1D 알고리즘에서 시간 종속성을 반영한 선박 연료계통 장비의 고장 진단 모델)

  • Kim, Hyung-Jin;Kim, Kwang-Sik;Hwang, Se-Yun;Lee, Jang Hyun
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.367-374
    • /
    • 2022
  • The purpose of this study was to propose a deep learning algorithm that applies to the fault diagnosis of fuel pumps and purifiers of autonomous ships. A deep learning algorithm reflecting the time dependence of the measured signal was configured, and the failure pattern was trained using the vibration signal, measured in the equipment's regular operation and failure state. Considering the sequential time-dependence of deterioration implied in the vibration signal, this study adopts Conv1D with sliding window computation for fault detection. The time dependence was also reflected, by transferring the measured signal from two-dimensional to three-dimensional. Additionally, the optimal values of the hyper-parameters of the Conv1D model were determined, using the grid search technique. Finally, the results show that the proposed data preprocessing method as well as the Conv1D model, can reflect the sequential dependency between the fault and its effect on the measured signal, and appropriately perform anomaly as well as failure detection, of the equipment chosen for application.

Future of Social Work Practice - Human, human again. - (사회복지실천의 미래 - 사람과 사람 -)

  • Kim, Miok;Choi, Hyeji;Chung, Ick-Joong;Min, So-young
    • Korean Journal of Social Welfare
    • /
    • v.69 no.4
    • /
    • pp.41-65
    • /
    • 2017
  • This study aimed to examine the social transition, which is often metaphorized as the Fourth Industrial Revolution, within the context of social work practice and to explore measures to improve social work practice in such transition. Four social welfare researchers held seven discussions to predict the social changes in the near future centered on the Fourth Industrial Revolution and find the corresponding development strategies in social work practice; collective autobiography method was used to analyze the discussion. The analysis ascertained hyper connectivity, the advent and expansion of new communities, diversification and individualization, and the emergence of new criteria for the assessment of one's quality of life as the distinctive qualities of the near future. It was analyzed that humans and organic materials will be interconnected through spatial and temporal transcendence and that humans liberated from labor will seek for diverse communities while the number of atomized individual will increase simultaneously. Furthermore, the rise of new order of life accompanied by both the expansion of diversification and individualization and the ecological worldview brought forth by post materialistic trend was predicted. Meanwhile, the disengagement from macroscopic context, a biased inclination towards technique orientated professionalism, and individualistic social work practices without integrity were identified as the limitations of the current social work practice. This study presented three goals for social work practice to help it overcome its current shortcomings and correspond to the social changes: first, the rearrangement of practice knowledge, technique, and value so that it is based on humans and society, which are the essence of social practice work; second, the practice, such as sharing economy, that expands the individuals' boundaries of life to the community; three, the restoration of the desirability of professional social works by examining its special nature.

A Study on Face Contour Line Extraction using Adaptive Skin Color (적응적 스킨 칼라를 이용한 얼굴 경계선 추출에 관한 연구)

  • Yu, Young-Jung;Park, Seong-Ho;Moon, Sang-Ho;Choi, Yeon-Jun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.383-391
    • /
    • 2017
  • In image processing, image segmentation has been studied by various methods in a long time. Image segmentation is the process of partitioning a digital image into multiple objects and face detection is a typical image segmentation field being used in a variety of applications that identifies human faces in digital images. In this paper, we propose a method for extracting the contours of faces included in images. Using the Viola-Jones algorithm, to do this, we detect the approximate locations of faces from images. But, the Viola-Jones algorithm could detected the approximate location of face not the correct position. In order to extract a more accurate face region from image, we use skin color in this paper. In details, face region would be extracted using the analysis of horizontal and vertical histograms on the skin area. Finally, the face contour is extracted using snake algorithm for the extracted face area. In this paperr, a modified snake energy function is proposed for face contour extraction based snake algorithm proposed by Williams et al.[7]

Methodology for Developing a Predictive Model for Highway Traffic Information Using LSTM (LSTM을 활용한 고속도로 교통정보 예측 모델 개발 방법론)

  • Yoseph Lee;Hyoung-suk Jin;Yejin Kim;Sung-ho Park;Ilsoo Yun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.1-18
    • /
    • 2023
  • With the recent developments in big data and deep learning, a variety of traffic information is collected widely and used for traffic operations. In particular, long short-term memory (LSTM) is used in the field of traffic information prediction with time series characteristics. Since trends, seasons, and cycles differ due to the nature of time series data input for an LSTM, a trial-and-error method based on characteristics of the data is essential for prediction models based on time series data in order to find hyperparameters. If a methodology is established to find suitable hyperparameters, it is possible to reduce the time spent in constructing high-accuracy models. Therefore, in this study, a traffic information prediction model is developed based on highway vehicle detection system (VDS) data and LSTM, and an impact assessment is conducted through changes in the LSTM evaluation indicators for each hyperparameter. In addition, a methodology for finding hyperparameters suitable for predicting highway traffic information in the transportation field is presented.

Statistical Method and Deep Learning Model for Sea Surface Temperature Prediction (수온 데이터 예측 연구를 위한 통계적 방법과 딥러닝 모델 적용 연구)

  • Moon-Won Cho;Heung-Bae Choi;Myeong-Soo Han;Eun-Song Jung;Tae-Soon Kang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.543-551
    • /
    • 2023
  • As climate change continues to prompt an increasing demand for advancements in disaster and safety management technologies to address abnormal high water temperatures, typhoons, floods, and droughts, sea surface temperature has emerged as a pivotal factor for swiftly assessing the impacts of summer harmful algal blooms in the seas surrounding Korean Peninsula and the formation and dissipation of cold water along the East Coast of Korea. Therefore, this study sought to gauge predictive performance by leveraging statistical methods and deep learning algorithms to harness sea surface temperature data effectively for marine anomaly research. The sea surface temperature data employed in the predictions spans from 2018 to 2022 and originates from the Heuksando Tidal Observatory. Both traditional statistical ARIMA methods and advanced deep learning models, including long short-term memory (LSTM) and gated recurrent unit (GRU), were employed. Furthermore, prediction performance was evaluated using the attention LSTM technique. The technique integrated an attention mechanism into the sequence-to-sequence (s2s), further augmenting the performance of LSTM. The results showed that the attention LSTM model outperformed the other models, signifying its superior predictive performance. Additionally, fine-tuning hyperparameters can improve sea surface temperature performance.

Video Assisted Thoracoscopic Sympathetic Ramus Clipping in Essential Hyperhidrosis -Cadaver Fitting Test and Clinical Application (다한증 환자에서 클립을 이용한 교감신경 교통가지 차단술 -사체 연구 및 임상적용-)

  • Lee, Sung-Ho;Cho, Seong-Joon;Jung, Jae-Seung;Kim, Tae-Sik;Son, Ho-Sung;Sun, Kyung;Kim, Kwang-Taik;Kim, Hyoung-Mook
    • Journal of Chest Surgery
    • /
    • v.36 no.8
    • /
    • pp.595-601
    • /
    • 2003
  • Background: It has been known that the most effective treatment method of hyperhidrosis is video-assisted thoracoscopic sympathetic nerve block. Postoperative compensatory hyperhidrosis and anhidrosis are major factors that decrease the postoperative satisfaction. Although sympathetic rami have been selectively blocked to decrease the complications, technical difficulties and excessive bleeding have prevented the universal application. Material and Method: Three pre-fixative cadavers were dissected before clinical application. Bilateral sympathetic chains were exposed in supine position after the whole anterior chest wall was removed. Second and third sympathetic rami were blocked using clips. After the sympathetic chains including ganglia were removed, we evaluated the extents of rami block. Twenty-five patients were subjected to the clinical application. Surgeries were performed in semi-fowlers position under general anesthesia and bilateral ventilation. 2 mm thoracoscopy and 5 mm trocar were intro-duced through third and fourth intercostal space, respectively. Second and third sympathetic rami were blocked using thoracoscopic clips. The postoperative complications, satisfaction, and compensatory hyperhidrosis rate were evaluated retrospectively. Result: Sympathetic rami were completely blocked in cadaver dissection study Hyper-hidrosis symptom was improved in all patients without operative complication. Operative time was shorter than that of traditional ramicotomy. All patients, except four, were satisfied with postoperative palmar hyperhidrosis. Com-pensatory hyperhidrosis was more severely happened in fifteen patients (60%). The remaining six patients had no complaint. Two patients had a minimal degree of gustatory hyperhidrosis. Conclusion: This operative method had shorter operative time and less complication rate, compared with traditional ramicotomy Operative success rate was similar to the traditional syrnpathicotorny; lower extent and occurrence rate of compensatory hyperhidrosis. The thoracic sympathetic rami clipping was suggested as an alternative method for treatment of palmar hyperhidrosis.