• Title/Summary/Keyword: system of computer mathematics

Search Result 329, Processing Time 0.03 seconds

A FAST POISSON SOLVER ON DISKS

  • Lee, Dae-Shik
    • Journal of applied mathematics & informatics
    • /
    • v.6 no.1
    • /
    • pp.65-78
    • /
    • 1999
  • We present a fast/parallel Poisson solver on disks, based on efficient evaluation of the exact solution given by the Newtonian potential and the Poisson integral. Derived from an integral formula-tion it is more accurate and simpler in parallel implementation and in upgrading to a higher order algorithm than an algorithm which solves the linear system obtained from a differential formulation.

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

A META-SOFTWARE SYSTEM FOR ORTHOGONAL DESIGNS AND HADAMARD MATRICES

  • Kotsireas, Ilias S.;Koukouvinos, Christos;Simos, Dimitris E.
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.5_6
    • /
    • pp.1571-1581
    • /
    • 2011
  • In this paper, we construct inequivalent Hadamard matrices based on several new and old full orthogonal designs, using circulant and symmetric block matrices. Not all orthogonal designs produce inequivalent Hadamard matrices, because the corresponding systems of equations do not possess solutions. The systems of equations arising when we search for inequivalent Hadamard matrices from full orthogonal designs using circulant and symmetric block matrices, can be concisely described using the periodic autocorrelation function of the generators of the block matrices. We use Maple, Magma, C and Unix tools to find many new inequivalent Hadamard matrices.

A MODELING PERSPECTIVE OF DELIBERATE SELF-HARM

  • Do, Tae-Sug;Lee, Young-S.
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.14 no.4
    • /
    • pp.275-284
    • /
    • 2010
  • Deliberate self-harm (DSH) is the act of deliberately harming your own body, such as cutting or burning yourself, without suicidal intent. It has especially become a problem among adolescents and college-age students in institutional settings such as boarding schools, Greek houses, detention centers and hospitals. We focus on contagion of DSH among adolescents and young adults by creating a deterministic epidemiological model. We study the impact of actual peer pressure, virtual peer pressure (the Internet) and treatment analytically in terms of a basic reproduction number through stability analysis of a system of ordinary differential equations. All parameters are approximated and results are also explored by simulations. The model shows that DSH is present in an endemic state in the population considered, and the control strategies are discussed.

DEGREE OF VERTICES IN VAGUE GRAPHS

  • BORZOOEI, R.A.;RASHMANLOU, HOSSEIN
    • Journal of applied mathematics & informatics
    • /
    • v.33 no.5_6
    • /
    • pp.545-557
    • /
    • 2015
  • A vague graph is a generalized structure of a fuzzy graph that gives more precision, flexibility and compatibility to a system when compared with systems that are designed using fuzzy graphs. In this paper, we define two new operation on vague graphs namely normal product and tensor product and study about the degree of a vertex in vague graphs which are obtained from two given vague graphs G1 and G2 using the operations cartesian product, composition, tensor product and normal product. These operations are highly utilized by computer science, geometry, algebra, number theory and operation research. In addition to the existing operations these properties will also be helpful to study large vague graph as a combination of small, vague graphs and to derive its properties from those of the smaller ones.

NON-FRAGILE GUARANTEED COST CONTROL OF UNCERTAIN LARGE-SCALE SYSTEMS WITH TIME-VARYING DELAYS

  • Park, Ju-H.
    • Journal of applied mathematics & informatics
    • /
    • v.9 no.1
    • /
    • pp.61-76
    • /
    • 2002
  • The robust non-fragile guaranteed cost control problem is studied in this paper for class of uncertain linear large-scale systems with time-varying delays in subsystem interconnections and given quadratic cost functions. The uncertainty in the system is assumed to be norm-hounded arid time-varying. Also, the state-feedback gains for subsystems of the large-scale system are assumed to have norm-bounded controller gain variations. The problem is to design state feedback control laws such that the closed-loop system is asymptotically stable and the closed-loop cost function value is not more than a specified upper bound far all admissible uncertainties. Sufficient conditions for the existence of such controllers are derived based on the linear matrix inequality (LMI) approach combined with the Lyapunov method. A parameterized characterization of the robust non-fragile guaranteed cost contrellers is 7iven in terms of the feasible solution to a certain LMI. Finally, in order to show the application of the proposed method, a numerical example is included.

A Design and Implementation of Learner Diagnosis System of mathematics for Elementary School Students Individualized Learning (초등수학의 개별학습을 위한 학습자 진단 시스템의 설계 및 구현)

  • Hur, Jung-Won;Kim, Kap-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2002
  • The purpose of this paper is to design and implement a LED (LEarner Diagnosis system). Mathematics which has learning hierarchies is difficult to learn, if learners don't understand previous learning contents. Before a learner starts learning, the LED offers diagnostic problems to diagnose the learner's understanding ability of the previous learning contents. If the learner don't understand it, then the LED present supplementary contents. After finishing the study, the learner has to pass the test to diagnose whether the learner do mastery learning. The LED makes learners do supplement previous contents, if learners don't understand it, and master all of the contents, learners can achieve learning object.

  • PDF

Bacterial Hash Function Using DNA-Based XOR Logic Reveals Unexpected Behavior of the LuxR Promoter

  • Pearson, Brianna;Lau, Kin H.;Allen, Alicia;Barron, James;Cool, Robert;Davis, Kelly;DeLoache, Will;Feeney, Erin;Gordon, Andrew;Igo, John;Lewis, Aaron;Muscalino, Kristi;Parra, Madeline;Penumetcha, Pallavi;Rinker, Victoria G.;Roland, Karlesha;Zhu, Xiao;Poet, Jeffrey L.;Eckdahl, Todd T.;Heyer, Laurie J.;Campbell, A. Malcolm
    • Interdisciplinary Bio Central
    • /
    • v.3 no.3
    • /
    • pp.10.1-10.8
    • /
    • 2011
  • Introduction: Hash functions are computer algorithms that protect information and secure transactions. In response to the NIST's "International Call for Hash Function", we developed a biological hash function using the computing capabilities of bacteria. We designed a DNA-based XOR logic gate that allows bacterial colonies arranged in a series on an agar plate to perform hash function calculations. Results and Discussion: In order to provide each colony with adequate time to process inputs and perform XOR logic, we designed and successfully demonstrated a system for time-delayed bacterial growth. Our system is based on the diffusion of ${\ss}$-lactamase, resulting in destruction of ampicillin. Our DNA-based XOR logic gate design is based on the op-position of two promoters. Our results showed that $P_{lux}$ and $P_{OmpC}$ functioned as expected individually, but $P_{lux}$ did not behave as expected in the XOR construct. Our data showed that, contrary to literature reports, the $P_{lux}$ promoter is bidirectional. In the absence of the 3OC6 inducer, the LuxR activator can bind to the $P_{lux}$ promoter and induce backwards transcription. Conclusion and Prospects: Our system of time delayed bacterial growth allows for the successive processing of a bacterial hash function, and is expected to have utility in other synthetic biology applications. While testing our DNA-based XOR logic gate, we uncovered a novel function of $P_{lux}$. In the absence of autoinducer 3OC6, LuxR binds to $P_{lux}$ and activates backwards transcription. This result advances basic research and has important implications for the widespread use of the $P_{lux}$ promoter.

Self-Directed MITS Based on the Web -The main theme is operation of numeral in primary school mathematics - (웹을 기반으로 한 자기 주도적 MITS -초등 수학 수와 연산 영역 중심-)

  • Kim, Dong-Hyuk;Goh, Byung-Oh;Choi, Eui-In
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.3
    • /
    • pp.335-349
    • /
    • 2004
  • Recently, there is change the environment of education due to development of Science Technology Specially, As education information on web increased by internet, using education web data by mean of medium that aids learning by computer. Also It studied method that used the Computer as learning medium through the CAI(Computer Assisted Instruction), ICAI(Intelligent CAI), and ITS(Intelligent Tutoring System). But legacy system are not support efficient method that learns to vary learner suitable learning method by individual level. Specially It is not suitable the education course to direct current course of education, and not consider different of student capability, aptitude, need, interesting, not maximized the individual growable power and effect of education. To solve the this problem, our paper suggest the web-based self-directed MITS(Multimedia ITS) that supply the needed the information on web, make the environment that can self-directed learning. To maximized effect of individual learning, our paper structured coursed, characterized, related learning contents in region of numeral at mathematics of primary school. And then integrated contents and class, design and implement the web-based MITS that consist of 4 module to escape from limitation of learner grade, learning time, learning place.

  • PDF

A study on pointing device system using stereo vision (스테레오 비전을 이용한 포인팅 디바이스에 관한 연구)

  • Han, Seung-Il;Hwang, Yong-Hyun;Lee, Byung-Gook;Lee, Joon-Jae
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.10 no.2
    • /
    • pp.67-80
    • /
    • 2006
  • In this paper, we propose a new pointing device that is replaced a mouse as the pointing device with. For reducing the existing pointing device's problem which had marker and high-cost, we develop a new pointing device using computer vision like as a similar human vision system. The proposed system first carries out a real-time movement tracking system using image data which are segmented by color modeling, and finally does the pointing action by 3-D coordinate calculated from stereo geometry information resulting from stereo matching of the segmented region.

  • PDF