• Title/Summary/Keyword: symmetric functions

Search Result 232, Processing Time 0.02 seconds

A NON-OVERLAPPING DOMAIN DECOMPOSITION METHOD FOR A DISCONTINUOUS GALERKIN METHOD: A NUMERICAL STUDY

  • Eun-Hee Park
    • Korean Journal of Mathematics
    • /
    • v.31 no.4
    • /
    • pp.419-431
    • /
    • 2023
  • In this paper, we propose an iterative method for a symmetric interior penalty Galerkin method for heterogeneous elliptic problems. The iterative method consists mainly of two parts based on a non-overlapping domain decomposition approach. One is an intermediate preconditioner constructed by understanding the properties of the discontinuous finite element functions and the other is a preconditioning related to the dual-primal finite element tearing and interconnecting (FETI-DP) methodology. Numerical results for the proposed method are presented, which demonstrate the performance of the iterative method in terms of various parameters associated with the elliptic model problem, the finite element discretization, and non-overlapping subdomain decomposition.

A novel framework for the construction of cryptographically secure S-boxes

  • Razi Arshad;Mudassir Jalil;Muzamal Hussain;Abdelouahed Tounsi
    • Computers and Concrete
    • /
    • v.34 no.1
    • /
    • pp.79-91
    • /
    • 2024
  • In symmetric cryptography, a cryptographically secure Substitution-Box (S-Box) is a key component of a block cipher. S-Box adds a confusion layer in block ciphers that provide resistance against well-known attacks. The generation of a cryptographically secure S-Box depends upon its generation mechanism. In this paper, we propose a novel framework for the construction of cryptographically secure S-Boxes. This framework uses a combination of linear fractional transformation and permutation functions. S-Boxes security is analyzed against well-known security criteria that include nonlinearity, bijectiveness, strict avalanche and bits independence criteria, linear and differential approximation probability. The S-Boxes can be used in the encryption of any grayscale digital images. The encrypted images are analyzed against well-known image analysis criteria that include pixel changing rates, correlation, entropy, and average change of intensity. The analysis of the encrypted image shows that our image encryption scheme is secure.

Study on the Solution of the Assignment Model Based on an Asymmetric Cost Function (비대칭 비용함수 기반의 통행배정모형 해석에 관한 연구)

  • Park, Jun-Hwan;Sin, Seong-Il;Im, Yong-Taek
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.161-170
    • /
    • 2007
  • The purpose of this study is to find the solution that overcomes the existing assumption of symmetric cost functions in multi-class assignment. In the assignment problem, the assumption of a symmetric cost function means that the link cost is determined by each unique mode and is not affected by any other modes. In this study, the authors have applied a diagonalized algorithm and a heuristic model based on column generation to a multi-class assignment model and analyzed the result. Through the study, the authors found that the diagonalized algorithm produces equilibrium solutions by the initial convergence condition. In contrast to the diagonalized algorithm, the column generation algorithm has improved the solution model to overcome the problem of equilibrium solutions in the diagonalized algorithm.

Free Vibration Analysis of Thin-walled Curved Beams with Unsymmetric Cross-section (비대칭 단면을 갖는 박벽 곡선보의 자유진동 해석)

  • 김문영
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.3 no.1
    • /
    • pp.41-54
    • /
    • 1999
  • For free vibration of non-symmetric thin-walled circular arches including restrained warping effect, the elastic strain and kinetic energy is derived by introducing displacement fields of circular arches in which all displacement parameters are defined at the centroid axis. The cubic Hermitian polynomials are utilized as shape functions for development of the curved thin-walled beam element having eight degrees of freedom. Analytical solution for in-plane free vibration behaviors of simply supported thin-walled curved beams with monosymmetric cross-sections is newly derived. Also, a finite element formulation using two noded curved beams element is presented by evaluating elastic stiffness and mass matrices. In order to illustrate the accuracy and practical usefulness of this study, analytical and numerical solutions for free vibration of circular arches are presented and compared with solutions analyzed by the straight beam element and the ABAQUS's shell element.

  • PDF

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

The Effects of Integrated Provision Action Observation and Synchronized Electrical Sensory Stimulation for Sit-to-stand in Stroke Patients Function (일어서기 동작에 대한 동작관찰과 동기화된 전기적 감각자극의 통합적 제공이 뇌졸중 환자의 기능에 미치는 효과)

  • Moon, Young;Choi, Jong-duk
    • Physical Therapy Korea
    • /
    • v.27 no.3
    • /
    • pp.191-198
    • /
    • 2020
  • Background: Stroke patients experience multiple dysfunctions that include motor and sensory impairments. Therefore, new intervention methods require a gradational approach depending on functional levels of a stroke patient's activity and should include cognition treatment to allow for a patient's active participation in rehabilitation. Objects: This study investigates the effect of integrated revision of electrical sensory stimulation, which stimulates somatosensory and action observation training, which is synchronized cognition intervention method on stroke patients' functions. Methods: Twenty-one stroke patients were randomized into two groups. The two groups underwent twenty minutes of intervention five times a week for three weeks. This study used an electromyogram to evaluate symmetric muscle activation of lower extremities and muscle onset time when performing sit to stand before and after intervention. A weight-bearing ratio was used to evaluate the weight-bearing of the affected side in a sit to standing. To evaluate sit to stand performance ability, this study performed five timed sit to stand tests. Results: The two groups both showed statistically significant improvement in muscle onset time of lower extremity, static balance ability in a standing position, and sit to stand performance after the intervention (p < 0.05). In addition, the action observation and synchronized electrical sensory stimulation group showed significant improvement in symmetric muscle activation of lower extremities and weight-bearing ratio of the affected side (p < 0.05). Conclusion: action observation and synchronized electrical sensory stimulation (AOT with ESS) can have positive effects on a stroke patient's sit to stand performance, and the intervention method that provides integrated AOT with ESS can be used as new nervous system intervention program.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

A Modified Parallel Iwan Model for Cyclic Hardening Behavior of Sand(I) : Model Development (수정 IWAN 모델을 이용한 사질토의 반복경화거동에 대한 연구(I): 모델 개발)

  • 이진선;김동수
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.7 no.5
    • /
    • pp.47-56
    • /
    • 2003
  • In this paper, the cyclic soil behavior model. which can accommodate the cyclic hardening, was developed by modifying the original parallel IWAN model. In order to consider the irrecoverable plastic strain of soil. the cyclic threshold strain, above which the backbone curve deviates from the original curve, was defined and the accumulated strain was determined by summation of the strains above the cyclic threshold in the stress-strain curve with applying Masing rule on unloading and reloading curves. The isotropic hardening elements are attached to the original parallel IWAN model and the slip stresses in the isotropic hardening elements are shown to increase according to the hardening functions. The hardening functions have a single parameter to account for the cyclic hardening and are defined by the symmetric limit cyclic loading test in forms of accumulated shear strain. The model development procedures are included in this paper and the verifications of developed model are discussed in the companion paper.

The Study on the Asymmetry of Inertia and Variety-Seeking State - Using Section-Aggregated Multinomial Logit Analysis (관성 및 다양성추구 상태의 비대칭성에 관한 연구 - 구간통합 다항로짓분석을 활용하여)

  • Lee, Seung-yon
    • Knowledge Management Research
    • /
    • v.14 no.1
    • /
    • pp.73-94
    • /
    • 2013
  • Customer's purchase state consists of purchase inertia and variety-seeking. As the growing brand familiarity triggers the increase of brand attractiveness, customers purchase state will be of inertia. However the excessively growing brand familiarity ignites the decrease of brand attractiveness. Followingly the purchase state will be tend to plunge into the variety-seeking state. The main topic of this study is to validate the asymmetric formation of customer's purchase states between inertia and variety-seeking. In order to follow up the main topic, this article introduces a model to freely describe the velocity of value changes depending upon the purchase states. This model will help overcome the limitation of the past studies having been based on the symmetric value changes. Based on this approach marketer will be able to decide the timing of sales promotions. This research utilized local telecommunication carrier's database of smartphone application purchase/download records. This database was collected from two years (2009 and 2010) span, the time when the smartphones started commodifying in Korea whilst most of the past studies had used purchase data of maturity stage products. From this approach utilizing the introduction stage data in the product life cycle, the probability of brand choice depending upon the purchase state on the early-stage can be probed. Moreover, this study tries to expand the research methodology from the other areas of research by knowledge sharing. Here this study introduces the methodology of section-aggregated multinomial logit to simultaneously estimate the parameters that were included in the plural multinomial logit functions while the plural functions were inter-connected. This adoption of section-aggregated multinomial logit model procedures from the computerized statistics areas is expected to nourish the marketing research for more precise analysis and estimation of effects of marketing activities.

  • PDF