• Title/Summary/Keyword: recovered paper

Search Result 606, Processing Time 0.021 seconds

Studies on the Development of Iodine Recovery Process with High Yield and Purity from NH4I Solution (NH4I 용액으로부터 고효율/고순도의 요오드 회수 공정개발에 관한 연구)

  • Yoon, Jong Sun;Lim, Seong Bin;Oh, Se Yong
    • Applied Chemistry for Engineering
    • /
    • v.26 no.3
    • /
    • pp.377-380
    • /
    • 2015
  • In this paper, we have investigated the optimization of $I_2$ recovery process from $NH_4I$ solution, which is generated as by-product during the amination reaction of p-diiodobenzene (PDIB) for p-phenylenediamine (PPD) synthesis. The recovered $I_2$ is then recycled as a raw material for PDIB synthesis. We have employed a cation exchange resin to recover $I_2$ from $NH_4I$ sample solution, and determined the breakthrough point and exchange capacity from the breakthrough curve. Furthermore, we have suggested optimum conditions of our $I_2$ recovery process by measuring the purity and yield of recovered $I_2$ with respect to the concentrations of $NH_4I$ and oxidant ($H_2O_2$) solutions, the oxidation time, and the temperature of drying process. Finally, the yield and purity as high as 94.96% and 96.65%, respectively were obtained by reusing the residual solution still containing unrecovered iodide ions.

The new Weakness of RSA and The Algorithm to Solve this Problem

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3841-3857
    • /
    • 2020
  • RSA is one of the best well-known public key cryptosystems. This methodology is widely used at present because there is not any algorithm which can break this system that has all strong parameters within polynomial time. However, it may be easily broken when at least one parameter is weak. In fact, many weak parameters are already found and are solved by some algorithms. Some examples of weak parameters consist of a small private key, a large private key, a small prime factor and a small result of the difference between two prime factors. In this paper, the new weakness of RSA is proposed. Assuming Euler's totient value, Φ (n), can be rewritten as Φ (n) = ad + b, where d is the private key and a, b ∈ ℤ, if a divides both of Φ (n) and b and the new exponent for the decryption equation is a small integer, this condition is assigned as the new weakness for breaking RSA. Firstly, the specific algorithm which is created for this weakness directly is proposed. Secondly, two equations are presented to find a, b and d. In fact, one of two equations must be implemented to find a and b at first. After that, the other equation is chosen to find d. The experimental results show that if this weakness has happened and the new exponent is small, original plaintext, m, will be recovered very fast. Furthermore, number of steps to recover d are very small when a is large. However, if a is too large, d may not be recovered because m which must be always written as m = ha is higher than modulus.

Structural Shocks of the Korean Economy: A Structural VAR Approach (통화(通貨)·물가(物價)·명목임금(名目賃金)의 장단기(長短期) 동학(動學)에 관한 연구(硏究))

  • Jun, Sung-in
    • KDI Journal of Economic Policy
    • /
    • v.14 no.1
    • /
    • pp.37-60
    • /
    • 1992
  • This paper applies a Structural VAR approach to a 4 variable system in real GNP, M2, GNP deflator and nominal monthly earnings, disentangling 4 structural shocks, i.e., aggregate demand and supply shocks, wage pushes and various forms of regulations reinforced especially during stabilization process. Preliminary diagnostic tests confirm that the log level of each time series has at least one unit root, though the evidence is somewhat ambiguous for real GNP. One co-integration relationship is found among 4 variables, while no co-integration is found in a subsystem consisting of nomina) variables. The absence of co-integration among nominal variables strongly suggested that money is not neutral even in the long-run. The reduced form is estimated and the structural form is recovered using 6 additional identifying restrictions. Recovered structural shocks are able to capture main episodes of past 20 years, ranging from first and second oil shocks, to strong stabilization policy of early 80's and rapid wage hikes of late 80's. Overall responses of the economy to each structural shock are usually consistent with the standard Keynesian predictions, though some responses seem to be specific to Korean economic environment.

  • PDF

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

Initiation and Growth Behavior of Small Fatigue Cracks in the Degraded 2 1/4 Cr-1 Mo Steel (2 1/4 Cr-1 Mo강 劣化材의 微小 疲勞龜裂의 발생 및 진전거동)

  • 곽상국;장재영;권재도;최선호;장순식
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.16 no.1
    • /
    • pp.53-62
    • /
    • 1992
  • Material can be degraded by using it for a long service under the high temperature and pressure circumstances, Therefore, material degradation can affect the strength of mechanical structures. At present, the life prediction of the degraded structures is considered as an important technical problem. In this paper, the degraded 21/4Cr-lMo steel is the material used for about 10 years around 400.deg. C in an oil refinery plant. The recovered one was prepared out of the above degraded steel by heat treatment for one hour at 650.deg. C. The degradation effect was investigated through the tension test, Hardness test and Charpy impact test. On the smooth surface material, the fatigue crack initiation, growth and coalescence stages of the distributed small cracks were investigated with photographs, and the crack length and density were measured. The measuring results were analyzed by quantative and statistical methods.

Color recovery of a chromatic digital image based on estimation of spectral distribution of illumination (장원의 분광분포 추정에 기반한 유색 디지털 영상의 색복원)

  • 이철희;이응주
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.2
    • /
    • pp.97-107
    • /
    • 2001
  • In this paper, an illuminant estimation algorithm of a chromatic digital images proposed. The proposed illumination estimation method has two phases. First, the surface spectral reflectances are recovered. In this case, the surface spectral reflectances recovered are limited to the maximum highlight region (MHR) which is the most achromatic and highly bright region of an image after applying intermediate color constancy process using a modified gray world algorithm. Next, the surface reflectances of the maximum highlight region are estimated using the principal component analysis method along with a set of given Munsell samples. Second, the spectral distribution of reflected lights of MHR is selected from the spectral database. That is a color difference is compared between the reflected lights of the MHR and the spectral database that is the set of reflected lights built by the given Munsell samples and a set of illuminants. Then the closest colors from the spectral database are selected. Finally, the illuminant of an image can be calculated dividing the average spectral distributions of reflected lights of MHR by the average surface reflectances of the MHR. In order to evaluate the proposed algorithm, experiments with artificial and real captured color-biased scenes were performed and numerical comparison examined. The proposed method was effective in estimating the spectral of the given illuminant sunder various illuminants.

  • PDF

Morpheme Recovery Based on Naïve Bayes Model (NB 모델을 이용한 형태소 복원)

  • Kim, Jae-Hoon;Jeon, Kil-Ho
    • The KIPS Transactions:PartB
    • /
    • v.19B no.3
    • /
    • pp.195-200
    • /
    • 2012
  • In Korean, spelling change in various forms must be recovered into base forms in morphological analysis as well as part-of-speech (POS) tagging is difficult without morphological analysis because Korean is agglutinative. This is one of notorious problems in Korean morphological analysis and has been solved by morpheme recovery rules, which generate morphological ambiguity resolved by POS tagging. In this paper, we propose a morpheme recovery scheme based on machine learning methods like Na$\ddot{i}$ve Bayes models. Input features of the models are the surrounding context of the syllable which the spelling change is occurred and categories of the models are the recovered syllables. The POS tagging system with the proposed model has demonstrated the $F_1$-score of 97.5% for the ETRI tree-tagged corpus. Thus it can be decided that the proposed model is very useful to handle morpheme recovery in Korean.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

Adaptive Equalization Algorithm of Enhanced CMA using Minimum Disturbance Technique (최소 Disturbance 기법을 적용한 향상된 CMA 적응 등화 알고리즘)

  • Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.55-61
    • /
    • 2014
  • This paper related with the ECMA (Enchanced CMA) algorithm performance which is possible to simultaneously compensation of the amplitude and phase by appling the minimum disturbance techniques in the CMA adatpve equalizer. The ECMA can improving the gradient noise amplification problem, stability and roburstness performance by the minimum disturbance technique that is the minimization of the equalizer tap weight variation in the point of squared euclidiean norm and the decision directed mode, and then the now cost function were proposed in order to simultaneouly compensation of amplitude and phase of the received signal with the minimum increment of computational operations. The performance of ECMA algorithm was compared to present MCMA by the computer simulation. For proving the performance, the recovered signal constellation that is the output of equalizer output signal and the residual isi and Maximum Distortion charateristic and MSE learning curve that are presents the convergence performance in the equalizer and the overall frequency transfer function of channel and equalizer were used. As a result of computer simulation, the ECMA has more better compensation capability of amplitude and phase in the recovered constellation, and the convergence time of adaptive equalization has improved compared to the MCMA.

A Study on the Formulation of High Resolution Range Profile and ISAR Image Using Sparse Recovery Algorithm (Sparse 복원 알고리즘을 이용한 HRRP 및 ISAR 영상 형성에 관한 연구)

  • Bae, Ji-Hoon;Kim, Kyung-Tae;Yang, Eun-Jung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.4
    • /
    • pp.467-475
    • /
    • 2014
  • In this paper, we introduce a sparse recovery algorithm applied to a radar signal model, based on the compressive sensing(CS), for the formulation of the radar signatures, such as high-resolution range profile(HRRP) and ISAR(Inverse Synthetic Aperture Radar) image. When there exits missing data in observed RCS data samples, we cannot obtain correct high-resolution radar signatures with the traditional IDFT(Inverse Discrete Fourier Transform) method. However, high-resolution radar signatures using the sparse recovery algorithm can be successfully recovered in the presence of data missing and qualities of the recovered radar signatures are nearly comparable to those of radar signatures using a complete RCS data without missing data. Therefore, the results show that the sparse recovery algorithm rather than the DFT method can be suitably applied for the reconstruction of high-resolution radar signatures, although we collect incomplete RCS data due to unwanted interferences or jamming signals.