• Title/Summary/Keyword: permutation

Search Result 418, Processing Time 0.025 seconds

A Genetic Algorithm Based Learning Path Optimization for Music Education (유전 알고리즘 기반의 음악 교육 학습 경로 최적화)

  • Jung, Woosung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2019
  • For customized education, it is essential to search the learning path for the learner. The genetic algorithm makes it possible to find optimal solutions within a practical time when they are difficult to be obtained with deterministic approaches because of the problem's very large search space. In this research, based on genetic algorithm, the learning paths to learn 200 chords in 27 music sheets were optimized to maximize the learning effect by balancing and minimizing learner's burden and learning size for each step in the learning paths. Although the permutation size of the possible learning path for 27 learning contents is more than $10^{28}$, the optimal solution could be obtained within 20 minutes in average by an implemented tool in this research. Experimental results showed that genetic algorithm can be effectively used to design complex learning path for customized education with various purposes. The proposed method is expected to be applied in other educational domains as well.

A study on the development of integrated class data using the mathematical linkage found in the study of Mendel (1865) ('Mendel(1865)의 연구에서 발견한 수학적 연결고리'를 이용한 통합 수업 자료 개발에 관한 연구)

  • Lee, Dong Gun
    • The Mathematical Education
    • /
    • v.58 no.3
    • /
    • pp.383-401
    • /
    • 2019
  • This study started with the idea that it is necessary to focus on common concepts and ideas among the subjects when conducting integrated education in high school. This is a preliminary study for developing materials that can be taught in mathematics in the context of already learning scientific concepts in high school. For this purpose, Mendel 's law of genetics was studied among the contents of biological subjects which are known to have relatively little connection with mathematics. The more common links between the two subjects are, the better, in order to integrate math and other subjects and develop materials for teaching. Therefore, in this study, we investigated not only the probability domain but also the concept of statistical domain. We have been wondering if there is a more abundant idea to connect between 'Mendel's law' and 'probability and statistics'. Through these anxieties, we could find that concepts such as 'likely equality' and 'permutation and combination' including 'a large number of laws' can be a link between two subjects. Based on this, we were able to develop class materials that correspond to classes. This study is expected to help with research related to development of integrated education support materials, focusing on mathematics.

Analysis of Occupational Injury and Feature Importance of Fall Accidents on the Construction Sites using Adaboost (에이다 부스트를 활용한 건설현장 추락재해의 강도 예측과 영향요인 분석)

  • Choi, Jaehyun;Ryu, HanGuk
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.11
    • /
    • pp.155-162
    • /
    • 2019
  • The construction industry is the highest safety accident causing industry as 28.55% portion of all industries' accidents in Korea. In particular, falling is the highest accidents type composed of 60.16% among the construction field accidents. Therefore, we analyzed the factors of major disaster affecting the fall accident and then derived feature importances by considering various variables. We used data collected from Korea Occupational Safety & Health Agency (KOSHA) for learning and predicting in the proposed model. We have an effort to predict the degree of occupational fall accidents by using the machine learning model, i.e., Adaboost, short for Adaptive Boosting. Adaboost is a machine learning meta-algorithm which can be used in conjunction with many other types of learning algorithms to improve performance. Decision trees were combined with AdaBoost in this model to predict and classify the degree of occupational fall accidents. HyOperpt was also used to optimize hyperparameters and to combine k-fold cross validation by hierarchy. We extracted and analyzed feature importances and affecting fall disaster by permutation technique. In this study, we verified the degree of fall accidents with predictive accuracy. The machine learning model was also confirmed to be applicable to the safety accident analysis in construction site. In the future, if the safety accident data is accumulated automatically in the network system using IoT(Internet of things) technology in real time in the construction site, it will be possible to analyze the factors and types of accidents according to the site conditions from the real time data.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Design of an Efficient AES-ARIA Processor using Resource Sharing Technique (자원 공유기법을 이용한 AES-ARIA 연산기의 효율적인 설계)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.39-49
    • /
    • 2008
  • AEA and ARIA are next generation standard block cipher of US and Korea, respectively, and these algorithms are used in various fields including smart cards, electronic passport, and etc. This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library. We designed shared S-boxes based on composite filed arithmetic for both algorithms, and also extracted common terms of the permutation matrices of both algorithms. With the $0.25-{\mu}m$ CMOS technology, our processor occupies 19,056 gate counts which is 32% decreased size from discrete implementations, and it uses 11 clock cycles and 16 cycles for AES and ARIA encryption, which shows 720 and 1,047 Mbps, respectively.

Effect of geography and altitude on the community characteristics of epigeic spiders in rice field levees (지형 및 고도에 따른 토양성 논거미 군집특성)

  • Eo, Jinu;Kim, Myung-Hyun;Kim, Min-Kyeong;Choi, Soon-Kun
    • Korean Journal of Environmental Biology
    • /
    • v.38 no.4
    • /
    • pp.594-602
    • /
    • 2020
  • This study investigated the effect of geography and altitude on epigeic spider communities in rice field levees in Jeollabuk-do. Spider communities in the mountainous and plain areas were compared to determine the effect of geography on the cultivation periods. The effect of altitude was compared between the Jeongeup and Jangsu areas during non-cultivation periods. Analysis using nMDS (non-metric multidimensional scaling), MRPP (multiple response permutation procedure), and ANOSIM (analysis of similarity) revealed differences in spider community structures between the two types of study areas. Lycosidae predominated at the family level, and its abundance was greater in the mountainous area than in the plains area. The total abundance did not differ between the two areas with different altitudes, but the abundance of three Pardosa species was greater at lower altitudes than at higher altitudes. Geography and altitude had a minimal effect on species richness and diversity indices at the community level. However, several Lycosidae species showed species-specific responses to both geography and altitude in the rice fields.

Modified AES having same structure in encryption and decryption (암호와 복호가 동일한 변형 AES)

  • Cho, Gyeong-Yeon;Song, Hong-Bok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. In this paper, we propose a SPN which has a symmetric structure in encryption and decryption. The whole operations of proposed algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2 round, applies a right function and the last half of them, (N+1)/2 to N round, employs an inverse function. And a symmetry layer is located in between the right function layer and the inverse function layer. In this paper, AES encryption and decryption function are selected for the right function and the inverse function, respectively. The symmetric layer is composed with simple matrix and round key addition. Due to the simplicity of the symmetric SPN structure in hardware implementation, the proposed modified AES is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds (6 라운드로 축소된 Sparkle384와 7 라운드로 축소된 Sparkle512에 대한 새로운 구별 공격)

  • Deukjo Hong;Donghoon Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.869-879
    • /
    • 2023
  • Sparkle is one of the finalists in the Lightweight Cryptography Standardization Process conducted by NIST. It is a nonlinear permutation and serves as a core component for the authenticated encryption algorithm Schwaemm and the hash function Esch. In this paper, we provide specific forms of input and output differences for 6 rounds of Sparkle384 and 7 rounds of Sparkle512, and make formulas for the complexity of finding input pairs that satisfy these differentials. Due to the significantly lower complexity compared to similar tasks for random permutations with the same input and output sizes, they can be valid distinguishing attacks. The numbers(6 and 7) of attacked rounds are very close to the minimum numbers(7 and 8) of really used rounds.

Risk Assessment for a Steel Arch Bridge System Based upon Response Surface Method Compared with System Reliability (체계신뢰성 평가와 비교한 응답면기법에 의한 강재아치교의 위험성평가)

  • Cho, Tae-Jun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.3
    • /
    • pp.273-279
    • /
    • 2007
  • Probabilistic Risk Assessment considering statistically random variables is performed for the preliminary design of an Arch Bridge. Component reliabilities of girders have been evaluated using the response surfaces of the design variables at the selected critical sections based on the maximum shear and negative moment locations. Response Surface Method (RSM) is successfully applied for reliability analyses lot this relatively small probability of failure of the complex structure, which is hard to be calculated by Monte-Carlo Simulations or by First Order Second Moment method that can not easily calculate the derivative terms in implicit limit state functions. For the analysis of system reliability, parallel resistance system composed of girders is modeled as a parallel series connection system. The upper and lower probabilities of failure for the structural system have been evaluated and compared with the suggested prediction method for the combination of failure modes. The suggested prediction method for the combination of failure modes reveals the unexpected combinations of element failures in significantly reduced time and efforts, compared with the previous permutation method or conventional system reliability analysis method.

MILP-Espresso-Based Automatic Searching Method for Differential Charactertistics (효율적인 MILP-Espresso 기반 차분 특성 자동 탐색 방법)

  • Park, YeonJi;Lee, HoChang;Hong, Deukjo;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.533-543
    • /
    • 2018
  • In this paper, we propose an MILP-based method for Optimal Probability of Bit-based Differential Characteristic in SP(Substitution-permutation) ciphers based on Automatic Differential Characteristic Searching Method of Sasaki, et al. In [13], they used input/output variables and probability variables seperatably, but we simplify searching procedure by putting them(variables) together into linear inequalities. Also, In order to decrease the more linear inequalities, we choose Espresso algorithm among that used by Sasaki, et al(Quine-McCluskey algorithm & Espresso algorithm). Moreover, we apply our method to GIFT-64, GIFT-128, SKINNY-64, and we obtained results in the GIFT(Active S-boxs : 6, Probabilities : $2^{-11.415}$) compared with the existing one.(Active S-boxs : 5, Probabilities : unknown). In case of SKINNY-64, we can't find better result, but can find same result compared with the existing one.