25 research outputs found
Design and implementation of robust embedded processor for cryptographic applications
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations. These additions further increase the complexity of the cryptographic devices which already need to perform computationally-intensive operations. Therefore, the general-purpose processors are usually supported by coprocessors/hardware accelerators to protect as well as to accelerate cryptographic applications. Using a configurable processor is just another solution. This work designs and implements robust execution units as an extension to a configurable processor, which detect the data faults (adversarial or otherwise) while performing the arithmetic operations. Assuming a capable adversary who can injects faults to the cryptographic computation with high precision, a nonlinear error detection code with high error detection capability is used. The designed units are tightly integrated to the datapath of the configurable processor using its tool chain. For different configurations, we report the increase in the space and time complexities of the configurable processor. Also, we present performance evaluations of the software implementations using the robust execution units. Implementation results show that it is feasible to implement robust arithmetic units with relatively low overhead in an embedded processor
Üniversitede Çalışan İdari Personele Göre “Kayırmacılık”
Bu ccedil%253Balışmada Pamukkale Uuml%253Bniversitesinde gouml%253Brev yapan idari personele gouml%253Bre kayırmacılık araştırılmıştır. Verilerinin toplanmasında Asunakutlu ve Avcı (2010) tarafından Abdalla vd., (1998%253A564-566) ve Ford ve McLaughin (1985%253A57-61) ccedil%253Balışmalarından yararlanarak geliştirilen Nepotizm algısını ouml%253Blccedil%253Bmeye yarayan ouml%253Blccedil%253Bek kullanılmıştır. Araştırmanın evrenini Pamukkale Uuml%253Bniversitesinde ccedil%253Balışan idari personel oluşturmaktadır. Araştırmanın ouml%253Brneklemini oluşturan akademik ve idari birimlerinde ccedil%253Balışan idari personel oranlı kuuml%253Bme ouml%253Brnekleme youml%253Bntemiyle seccedil%253Bilmiştir. Ouml%253Brnekleme alınan 299 idari personele ulaşılmıştır. Verilerin ccedil%253Bouml%253Bzuuml%253Bmlenmesinde SPSS for Windows (Statistical Packages for Social Sciences) paket programı kullanılmıştır. Araştırmanın Sonucu olarak%253B Pamukkale Uuml%253Bniversitesi idari ccedil%253Balışanlarının, kayırmacılığın her uuml%253Bccedil%253B boyutununkurumlarında var olduğu algısına sahip oldukları souml%253Bylenebilir
The potential role of scar mapping in assessing of paroxysmal atrial fibrillation recurrence after cryoballoon application
Cryoballoon ablation for atrial fibrillation (AF) has become a frequently used therapy after failure of at least one antiarrhythmic drug. The main target of AF ablation has been durable pulmonary vein isolation. However, it is unclear if ablation strategies need to be modified after recurrence. Herein, we presented a female patient undergoing successful pulmonary vein re-connection ablation after left atrial scar mapping. In electroanatomical mapping, gray area shows intense scar tissue. Gray, red, and purple areas indicate atrial potentials <0.5 mV, 0.5–1.5 mV, and >1.5 mV, respectively. Please note that there is a non-scar area in the bottom of right inferior pulmonary vein (arrow)
Infrahyoid Flap, a Convenient Alternative for Reconstruction of Tongue and Floor of Mouth Defects: Case Series
Objective: The aim of this study was to share our clinical experience with the neurovascular myofasiocutan infrahyoid flap (NMIHF), which was used for the reconstruction of the defects after oral cavity cancer surgery.Methods: Records of five patients who were diagnosed with oral cavity cancer and underwent tumor resection, neck dissection, and defect reconstruction with NMIHF between 2012 and 2017 were analyzed retrospectively.Results: The infrahyoid flap was used in five patients: four males and one female. The mean age of patients was 61.8 years. Four patients underwent tumor resection and bilateral level I-III neck dissection, whereas one patient underwent tumor resection and unilateral level I-III neck dissection. NMIHF was used for the reconstruction of the defects during the same procedure in all the patients. Mean post-operative follow-up was 30.6 months. Partial skin necrosis was observed in two patients, but none of the patients showed total necrosis of the flap. Postoperatively, oral intake was initiated after an average of 12 days in all patients. For two patients who required post-operative radiotherapy (RT), the treatment was started after an average of 50 days.Conclusion: NMIHF does not prolong operation time and does not cause additional scar in the neck, and the defect in the donor field can be closed without the use of a graft or flap. This is considered to be a reliable and successful alternative to free flaps for the reconstruction of oral cavity defects
Basbariton sesler için düzenlenmiş piyano eşlikli türkülerin ses eğitiminde kullanılabilirliği
BASBARİTON SESLER İÇİN DÜZENLENMİŞ PİYANO EŞLİKLİ TÜRKÜLERİN SES EĞİTİMİNDE KULLANILABİLİRLİĞİ
Bu araştırmada; basbariton sesler için düzenlenmiş olan piyano eşlikli türkülerin, basbariton ses grubunun eğitim sürecinde ne ölçüde kullanılabilir olduğunun araştırılması amaçlanmıştır.
Geleneksel Türk Halk Müziğinin içinde yer alan ve Türk bestecileri tarafından düzenlenerek piyano eşlikleri yazılan eserlerin, ses eğitiminde kullanılabilme olasılığının lisans dönemindeki basbariton ses aralığına sahip öğrencilerdeki gelişime katkısı incelenmiştir.
Araştırmada, Mersin Devlet Opera ve Balesi’nde görevli bas ve bariton sanatçılar ve ses eğitimi öğretim elemanlarının analizleri doğrultusunda anket sorularını hazırlamıştır. Hazırlanan bu sorular daha önce belirlediğimiz üniversitelerin devlet konservatuarı opera-şan ana sanat dalı ve eğitim fakültesi güzel sanatlar bölümü müzik öğretmenliği anabilim dalında görev yapan 30 öğretim elemanına uygulanmıştır.
Araştırma sonucunda elde edilen bulgulardan anlaşıldığı üzere basbariton sesler için düzenlenmiş piyano eşlikli türkülerin lisans düzeyindeki ses eğitimi dersinde önemli bir yer tuttuğu; ancak seviyeye göre değişiklikler gösterdiği ortaya çıkmıştır. Bu konuda çalışmalar yapan Türk bestecilerinin desteklenmesinin gerekliliği ve basbariton ses grubundaki öğrencilere ses eğitimi dersinde uygulanacak olan bu türkülerin öğrencilerin gelişimlerinde etkili olacağı sonucuna varılmıştır.
Anahtar Kelimeler: Ses Eğitimi, Türkü, Basbariton, Müzik Eğitimi
ABSTRACT
THE USABILITY OF THE BALLADS WITH PIANO ACCOMPANIMENT ARRANGED FOR BASS-BARITONE (BASSO CANTANTE) IN VOICE (MUSIC) EDUCATION
This study aims at investigating the extent of usability of the ballads with piano accompaniment in the education process of bass-baritone (basso cantante) voices.
The use of the traditional ballads which take place in Turkish Folk Music and have been arranged by the Turkish musicians in the education of bass-baritone (basso cantante) students at the university level and its contribution on their progress has also been investigated.
A questionnaire has been prepared depending on the analysis of the singers with basso and baritone voices who are working at Mersin State Opera and Ballet. 30 university lecturers working in the singing departments of the state conservatories and the music education departments of education faculties chosen before have answered the questionnaire.
The findings of the study have indicated that the use of the ballads with piano accompaniment arranged for bass-baritone (basso cantante) has taken a crucial place in singing education at the university level; however, this use may change according to the level of the students. The musicians studying in this field should be supported. Moreover, these ballads to be used in singing education courses will be effective in the progress of the bass-baritone (basso cantante) students.
Key words: Singing Education, Turkish Folk Music, Bass-Baritone, Music Educatio
Üniversitede çalışan idari personele göre “kayırmacılık”1
Bu çalışmada Pamukkale Üniversitesinde görev yapan idari personele göre “kayırmacılık” araştırılmıştır. Verilerinin toplanmasında Asunakutlu ve Avcı (2010) tarafından Abdalla vd., (1998:564-566) ve Ford ve McLaughin (1985:57-61) çalışmalarından yararlanarak geliştirilen Nepotizm algısını ölçmeye yarayan ölçek kullanılmıştır. Araştırmanın evrenini Pamukkale Üniversitesinde çalışan idari personel oluşturmaktadır. Araştırmanın örneklemini oluşturan akademik ve idari birimlerinde çalışan idari personel oranlı küme örnekleme yöntemiyle seçilmiştir. Örnekleme alınan 299 idari personele ulaşılmıştır. Verilerin çözümlenmesinde “SPSS for Windows (Statistical Packages for Social Sciences)” paket programı kullanılmıştır. Araştırmanın Sonucu olarak; Pamukkale Üniversitesi idari çalışanlarının, kayırmacılığın her üç boyutunun kurumlarında var olduğu algısına sahip oldukları söylenebilir
On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks
Quadratic residue codes are introduced as an effective and efficient error detection technique to protect cryptographic devices against fault attacks. In this paper, we re-consider these codes in an adversarial model, where a powerful attacker can introduce errors with high precision and accuracy. We present two analysis techniques that can lead to successful attacks against quadratic codes if the modulus is not chosen carefully. We provide in-depth theoretical analysis that covers wide range of attacks and present results of practical concerns such as exact number of undetected errors and effective countermeasures. Our analysis is generic in the sense that it can be extended to other residue codes
On protecting cryptographic applications against fault attacks using residue codes
We propose a new class of error detection codes, quadratic dual residue codes, to protect cryptographic computations running on general-purpose processor cores against fault attacks. The assumed adversary model is a powerful one, whereby the attacker can inject errors anywhere in the data path of a general-purpose microprocessor by bit flipping. We demonstrate that quadratic dual residue codes provide a much better protection under this powerful adversary
model compared to similar codes previously proposed for the same purpose in the literature. The adopted strategy aims to protect the single-precision arithmetic
operations, such as addition and multiplication, which usually dominate the execution time of many public key cryptography algorithms in general-purpose microprocessors. Two so called robust units for addition and multiplication operations, which provide a protection against faults attacks, are designed and tightly integrated into the data path of a simple, embedded re-configurable processor. We report the implementation results that compare the proposed error detection codes favorably with previous proposals of similar type
in the literature. In addition, we present performance evaluations of the software implementations of Montgomery multiplication algorithm using the robust execution units. Implementation results clearly show that it is feasible to implement robust arithmetic units with relatively low overhead even for a simple embedded processor