3,042 research outputs found
Serially Connected Micro Amorphous Silicon Solar Cells for Compact High-Voltage Sources
We demonstrate a compact amorphous silicon (a-Si) solar module to be used as high-voltage power supply. In comparison with the organic solar module, the main advantages of the a-Si solar module are its compatibility with photolithography techniques and relatively high power conversion efficiency. The open circuit voltage of a-Si solar cells can be easily controlled by serially interconnecting a-Si solar cells. Moreover, the a-Si solar module can be easily patterned by photolithography in any desired shapes with high areal densities. Using the photolithographic technique, we fabricate a compact a-Si solar module with noticeable photovoltaic characteristics as compared with the reported values for high-voltage power supplies
Comparative Analysis of Tongue Indices between Patients with and without a Self-Reported Yin Deficiency: A Cross-Sectional Study
We investigated the hypothesis that Yin-deficient patients have a reddened tongue with less coating. We screened 189 participants aged 20 to 49 years, complaining of headache. To classify patients in terms of Yin deficiency, we used two self-reporting Yin-deficiency questionnaires (Yin-Deficiency Questionnaire and Yin-Deficiency Scale) and diagnosis by a doctor. Based on the tests, a total of 33 subjects were assigned to a Yin-deficient group and 33 subjects were assigned to a nondeficient control group. Tongue images were acquired using a computerized tongue diagnostic system, for evaluating tongue indices. The tongue coating percentage and tongue redness were calculated as the mean a⁎ value of both the whole tongue area (WT a⁎) and the tongue body area (TB a⁎). The tongue coating percentage of the Yin-deficient group (34.79 ± 10.76) was lower than that of the nondeficient group (44.13 ± 14.08). The WT a⁎ value of the Yin-deficient group (19.39 ± 1.52) was significantly higher than that of the nondeficient group (18.21 ± 2.06). However, the difference in the TB a⁎ value between the two groups was not significant. In conclusion, we verified that Yin-deficient patients had less tongue coating and tended to have a more reddish tongue than nondeficient patients
DivGraphPointer: A Graph Pointer Network for Extracting Diverse Keyphrases
Keyphrase extraction from documents is useful to a variety of applications
such as information retrieval and document summarization. This paper presents
an end-to-end method called DivGraphPointer for extracting a set of diversified
keyphrases from a document. DivGraphPointer combines the advantages of
traditional graph-based ranking methods and recent neural network-based
approaches. Specifically, given a document, a word graph is constructed from
the document based on word proximity and is encoded with graph convolutional
networks, which effectively capture document-level word salience by modeling
long-range dependency between words in the document and aggregating multiple
appearances of identical words into one node. Furthermore, we propose a
diversified point network to generate a set of diverse keyphrases out of the
word graph in the decoding process. Experimental results on five benchmark data
sets show that our proposed method significantly outperforms the existing
state-of-the-art approaches.Comment: Accepted to SIGIR 201
Multimodal route choice in maritime transportation: The case of Korean auto-parts exporters
Global offshoring has increased the need for transport of half-finished goods and components, along with finished goods. The auto-parts industry in Korea has also entered the global market as Korean car manufacturers have started to build overseas factories. Maintaining cost competitiveness by minimising total logistics costs will thus be a critical strategy for the industry. This research compares the total annual costs of four feasible transport routes from Korea to the US using the inventory-theoretic model, which encompasses direct transport costs, in-transit carrying costs, and warehouse inventory costs. We apply this model to real transport data collected from a Korean auto-parts company. A static analysis shows that inventory costs can play a decisive role in altering the cost competitiveness of different routes. In addition, sensitivity and scenario analyses with changes in variables and the market situations reveal that the cost structure of each routes plays an important role in determining their relative cost competitiveness in varying market conditions
Table Redundancy Method for Protecting against Fault Attacks
Fault attacks (FA) intentionally inject some fault into the encryption process for analyzing a secret key based on faulty intermediate values or faulty ciphertexts. One of the easy ways for software-based countermeasures is to use time redundancy. However, existing methods can be broken by skipping comparison operations or by using non-uniform distributions of faulty intermediate values. In this paper, we propose a secure software-based redundancy, aptly named table redundancy, applying different linear and nonlinear transformations to redundant computations of table-based block cipher structures. To reduce the table size and the number of lookups, some outer tables that are not subjected to FA are shared, while the inner tables are protected by table redundancy. The basic idea is that different transformations protecting redundant computations are correctly decoded if the redundant outcomes are combined without faulty values. In addition, this recombination provides infective computations because a faulty byte is likely to propagate its error to adjacent bytes due to the use of 32-bit linear transformations. Our method also presents a stateful feature in the connection with detected faults and subsequent plaintexts for preventing iterative fault injection. We demonstrate the protection of AES-128 against FA and show a negligible advantage of FA
On the Linear Transformation in White-box Cryptography
Linear transformations are applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is not enough to protect the key against statistical analysis. So far, the Hamming weight of rows in the invertible matrix has been considered the main cause of the key leakage from the linear transformation.
In this study, we present an in-depth analysis of the distribution of intermediate values and the characteristics of block invertible binary matrices. Our mathematical analysis and experimental results show that the balanced distribution of the key-dependent intermediate value is the main cause of the key leakage
- …