3,042 research outputs found

    Extracting Keywords from Multi-party Live Chats

    Get PDF

    Classifying Dialogue Acts in Multi-party Live Chats

    Get PDF

    Serially Connected Micro Amorphous Silicon Solar Cells for Compact High-Voltage Sources

    Get PDF
    We demonstrate a compact amorphous silicon (a-Si) solar module to be used as high-voltage power supply. In comparison with the organic solar module, the main advantages of the a-Si solar module are its compatibility with photolithography techniques and relatively high power conversion efficiency. The open circuit voltage of a-Si solar cells can be easily controlled by serially interconnecting a-Si solar cells. Moreover, the a-Si solar module can be easily patterned by photolithography in any desired shapes with high areal densities. Using the photolithographic technique, we fabricate a compact a-Si solar module with noticeable photovoltaic characteristics as compared with the reported values for high-voltage power supplies

    Comparative Analysis of Tongue Indices between Patients with and without a Self-Reported Yin Deficiency: A Cross-Sectional Study

    Get PDF
    We investigated the hypothesis that Yin-deficient patients have a reddened tongue with less coating. We screened 189 participants aged 20 to 49 years, complaining of headache. To classify patients in terms of Yin deficiency, we used two self-reporting Yin-deficiency questionnaires (Yin-Deficiency Questionnaire and Yin-Deficiency Scale) and diagnosis by a doctor. Based on the tests, a total of 33 subjects were assigned to a Yin-deficient group and 33 subjects were assigned to a nondeficient control group. Tongue images were acquired using a computerized tongue diagnostic system, for evaluating tongue indices. The tongue coating percentage and tongue redness were calculated as the mean a⁎ value of both the whole tongue area (WT a⁎) and the tongue body area (TB a⁎). The tongue coating percentage of the Yin-deficient group (34.79 ± 10.76) was lower than that of the nondeficient group (44.13 ± 14.08). The WT a⁎ value of the Yin-deficient group (19.39 ± 1.52) was significantly higher than that of the nondeficient group (18.21 ± 2.06). However, the difference in the TB a⁎ value between the two groups was not significant. In conclusion, we verified that Yin-deficient patients had less tongue coating and tended to have a more reddish tongue than nondeficient patients

    DivGraphPointer: A Graph Pointer Network for Extracting Diverse Keyphrases

    Full text link
    Keyphrase extraction from documents is useful to a variety of applications such as information retrieval and document summarization. This paper presents an end-to-end method called DivGraphPointer for extracting a set of diversified keyphrases from a document. DivGraphPointer combines the advantages of traditional graph-based ranking methods and recent neural network-based approaches. Specifically, given a document, a word graph is constructed from the document based on word proximity and is encoded with graph convolutional networks, which effectively capture document-level word salience by modeling long-range dependency between words in the document and aggregating multiple appearances of identical words into one node. Furthermore, we propose a diversified point network to generate a set of diverse keyphrases out of the word graph in the decoding process. Experimental results on five benchmark data sets show that our proposed method significantly outperforms the existing state-of-the-art approaches.Comment: Accepted to SIGIR 201

    Multimodal route choice in maritime transportation: The case of Korean auto-parts exporters

    Get PDF
    Global offshoring has increased the need for transport of half-finished goods and components, along with finished goods. The auto-parts industry in Korea has also entered the global market as Korean car manufacturers have started to build overseas factories. Maintaining cost competitiveness by minimising total logistics costs will thus be a critical strategy for the industry. This research compares the total annual costs of four feasible transport routes from Korea to the US using the inventory-theoretic model, which encompasses direct transport costs, in-transit carrying costs, and warehouse inventory costs. We apply this model to real transport data collected from a Korean auto-parts company. A static analysis shows that inventory costs can play a decisive role in altering the cost competitiveness of different routes. In addition, sensitivity and scenario analyses with changes in variables and the market situations reveal that the cost structure of each routes plays an important role in determining their relative cost competitiveness in varying market conditions

    Table Redundancy Method for Protecting against Fault Attacks

    Get PDF
    Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA

    On the Linear Transformation in White-box Cryptography

    Get PDF
    Linear transformations are applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is not enough to protect the key against statistical analysis. So far, the Hamming weight of rows in the invertible matrix has been considered the main cause of the key leakage from the linear transformation. In this study, we present an in-depth analysis of the distribution of intermediate values and the characteristics of block invertible binary matrices. Our mathematical analysis and experimental results show that the balanced distribution of the key-dependent intermediate value is the main cause of the key leakage
    corecore