• Title/Summary/Keyword: A key technique

Search Result 1,732, Processing Time 0.024 seconds

A Study on the Advanced RFID System in Railway using the Parallel CRC Technique (철도에서 병렬 순환 잉여 기법을 이용한 차세대 무선인식 시스템에 관한 연구)

  • Kang Tai-Kyu;Lee Jae-Ho;Shin Seok-Kyun;Lee Jae-Hoon;Lee Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.8 no.1
    • /
    • pp.1-5
    • /
    • 2005
  • This paper has presented the parallel cyclic redundancy check (CRC) technique that performs CRC computation in parallel superior to the conventional CRC technique that processes data bits serially. Also, it has showed that the implemented parallel CRC circuit has been successfully applied to the inductively coupled passive RFTD system working at a frequency of 13.56㎒ in order to process the detection of logical faults more fast and the system has been verified experimentally. In comparison with previous works, the proposed RFID system using the parallel CRC technique has been shown to reduce the latency and increase the data processing rates about 15% In the results. Therefore, it seems reasonable to conclude that the parallel CRC realization in the RFID system offers a means of maintaining the integrity of data in the high speed RFID system.

Modified drainage of submasseteric space abscess

  • Choi, Moon-Gi
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.43 no.3
    • /
    • pp.197-203
    • /
    • 2017
  • Once a submasseteric space infection is diagnosed, the key to resolving the infection is via surgical intervention to evacuate the pus. Although it is possible and occasionally practical to drain the submasseteric space via an intraoral approach, an extraoral approach may sometimes be required. Surgeons have encountered complications such as facial nerve damage during extraoral incision and drainage procedures, and they have felt that extraoral dissection was very difficult. As such, an easier and simpler technique is needed. Our department recently modified various drainage techniques for submasseteric space abscesses. Damage to the marginal branch of the facial nerve did not occur, and this technique was very simple and rapid, such that a novice physician could perform this procedure. This modified technique was possible with trismus and under local anesthesia. After intraorally checking the position of the drain, the intraoral wound is closed with an absorbable suture and the drain is fixed to the extraoral skin. When a masseteric space infection is diagnosed, multiple space involvement is ruled out, and dependent drainage is required, this modified drainage technique can be useful.

An optimized mesh partitioning in FEM based on element search technique

  • Shiralinezhad, V.;Moslemi, H.
    • Computers and Concrete
    • /
    • v.23 no.5
    • /
    • pp.311-320
    • /
    • 2019
  • The substructuring technique is one of the efficient methods for reducing computational effort and memory usage in the finite element method, especially in large-scale structures. Proper mesh partitioning plays a key role in the efficiency of the technique. In this study, new algorithms are proposed for mesh partitioning based on an element search technique. The computational cost function is optimized by aligning each element of the structure to a proper substructure. The genetic algorithm is employed to minimize the boundary nodes of the substructures. Since the boundary nodes have a vital performance on the mesh partitioning, different strategies are proposed for the few number of substructures and higher number ones. The mesh partitioning is optimized considering both computational and memory requirements. The efficiency and robustness of the proposed algorithms is demonstrated in numerous examples for different size of substructures.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

A Technique of Applying Embedded Sensors to Intuitive Adjustment of Image Filtering Effect in Smart Phone (스마트폰에서 이미지 필터링 효과의 직관적 조정을 위한 내장센서의 적용 기법)

  • Kim, Jiyeon;Kwon, Sukmin;Jung, Jongjin
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.960-967
    • /
    • 2015
  • In this paper, we propose a user interface technique based on embedded sensors applying to apps in smart phone. Especially, we implement avata generation application using image filtering technique for photo image in smart phone. In the application, The embedded sensors are used as intuitive user interface to adjust the image filtering effect for making user satisfied effect in real time after the system produced the image filtering effect for avatar. This technique provides not a simple typed method of parameter values adjustment but a new intuitively emotional adjustment method in image filtering applications. The proposed technique can use sound values from embedded mike sensor for adjusting key values of sketch filter effect if the smart phone user produces sound. Similiarly the proposed technique can use coordinate values from embedded acceleration sensor for adjusting masking values of oil painting filter effect and use brightness values from embedded light sensor for adjusting masking values of sharp filter effect. Finally, we implement image filtering application and evaluate efficiency and effectiveness for the proposed technique.

A Study on Routing Performance Improvement through Cooperation Authentication Technique (협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

Multi-axial Vibration Test on MAST System with Field Data (국내도로 주행 시험을 통한 6축 진동시험 방법에 관한 연구)

  • Kim, Chan-Jung;Bae, Chul-Yong;Lee, Bang-Hyun;Kwon, Seong-Jin;Na, Byung-Chul
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.16 no.7 s.112
    • /
    • pp.704-711
    • /
    • 2006
  • Vibration test on MAST(multi axial simulation table) system has several advantage over one-axial vibration test that could simulate 6-DOF, 3-axial translation and 3-axial moment, at the same time. Since field vibration motion can be fully represented with 6-DOF, multi-axial vibration test on vehicle component is widely conducted in technical leading companies to make sure its fatigue performance in vibration environment. On the way to fulfill the process, editing technique of obtained field data is key issue to success a reliable vibration testing with MAST system. Since the original signals are not only too large to fulfill it directly, but all of the measured data is not guarantee its convergency on generating its driving files, editing technique of the original signals are highly required to make some events that should meet the equal fatigue damage on the target component In this paper, key technique on editing a field data feasible for MAST system is described based on energy method in vibration fatigue. To explain its technique explicitly, author first introduced a process on field data acquisition of two vehicle component and then, representing events are produced to keep up with the editing strategy about a energy method. In the final chapter, a time information regarding a vibration test on MAST system is derived from the energy data which is critical information to perform a vibration test.

MAST Vibration on MAST System with Field Data (국내도로 주행 시험을 통한 6축 진동시험 방법에 관한 연구)

  • Kim, Chan-Jung;Bae, Chul-Yong;Lee, Bong-Hyun;Kwon, Seong-Jin;Na, Byung-Chul
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.764-769
    • /
    • 2006
  • Vibration test on MAST(multi axial simulation table) system has several advantage over one-axial vibration test that could simulate 6-DOF, 3-axial translation and 3-axial moment, at the same time. Since field vibration motion can be fully represented with 6-DOF, multi-axial vibration test on vehicle component is widely conducted in technical leading companies to make sure its fatigue performance in vibration environment. On the way to fulfill the process, editing technique of obtained field data is key issue to success a reliable vibration testing with MAST system. Since the original signals are not only too large to fulfill it directly, but all of the measured data is not guarantee its convergency on generating its driving files, editing technique of the original signals are highly required to make some events that should meet the equal fatigue damage on the target component In this paper, key technique on editing a field data feasible for MAST system is described based on energy method in vibration fatigue. To explain its technique explicitly, author first introduced a process on field data acquisition of two vehicle component and then, representing events are produced to keep up with the editing strategy about a energy method. In the final chapter, a time information regarding a vibration test on MAST system is derived from the energy data which is critical information to perform a vibration test.

  • PDF

Group Key Assignment Scheme based on Secret Sharing Scheme for Dynamic Swarm Unmanned Systems (동적 군집 무인체계를 위한 비밀분산법 기반의 그룹키 할당 기법)

  • Jongkwan Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.93-100
    • /
    • 2023
  • This paper presents a novel approach for assigning group keys within a dynamic swarm unmanned system environment. In this environment, multiple groups of unmanned systems have the flexibility to merge into a single group or a single unmanned system group can be subdivided into multiple groups. The proposed protocol encompasses two key steps: group key generation and sharing. The responsibility of generating the group key rests solely with the leader node of the group. The group's leader node employs a secret sharing scheme to fragment the group key into multiple fragments, which are subsequently transmitted. Nodes that receive these fragments reconstruct a fresh group key by combining their self-generated secret fragment with the fragment obtained from the leader node. Subsequently, they validate the integrity of the derived group key by employing the hash function. The efficacy of the proposed technique is ascertained through an exhaustive assessment of its security and communication efficiency. This analysis affirms its potential for robust application in forthcoming swarm unmanned system operations scenarios characterized by frequent network group modifications.

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.