• Title/Summary/Keyword: A key technique

Search Result 1,740, Processing Time 0.027 seconds

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Evaluation of Key Success Factors for Web Design in Taiwan's Bike Case Study

  • LAI, I-Sung;HUANG, Yung-Fu;SIANG, Jie-Hua;WENG, Ming-Wei
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.927-937
    • /
    • 2020
  • Global warming awareness through energy conservation is growing due to the regulatory policies issued by governments and voluntary organization that established carbon emission limits. Transportation is one of the major contributors to carbon emissions. Bike will be simultaneously saving money, getting fit and helping to reduce global warming. Web design has been identified as a key factor for the acceptance and success of the websites and electronic commerce. The purpose of this research is to investigate the effective implementation of the proposed Analytic Hierarchy Process (AHP) technique on a bike case study whose company (Bike Company) is involved in web design for a critical component in the demonstration. Survey research used a variety of data collection methods, with the most common being questionnaires and interviews of some exporters. The research results reveal that the top five key success factors are Good reputation, Transaction security, Ease of use, Promotion, and Diversified choices, which provide the guidelines and directions for decision-makers to design effective websites in the current competitive business scenario. The major findings of this study are suggesting that Internet marketing channels are securing the company's relevance, together with paving the way for methods to increase web traffic.

Registration-free 3D Point Cloud Data Acquisition Technique for as-is BIM Generation Using Rotating Flat Mirrors

  • Li, Fangxin;Kim, Min-Koo;Li, Heng
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.3-12
    • /
    • 2020
  • Nowadays, as-is BIM generation has been popularly adopted in the architecture, engineering, construction and facility management (AEC/FM) industries. In order to generate a 3D as-is BIM of a structural component, current methods require a registration process that merges different sets of point cloud data obtained from multiple locations, which is time-consuming and registration error-prone. To tackle this limitation, this study proposes a registration-free 3D point cloud data acquisition technique for as-is BIM generation. In this study, small-size mirrors that rotate in both horizontal and vertical direction are used to enable the registration-free data acquisition technique. First, a geometric model that defines the relationship among the mirrors, the laser scanner and the target component is developed. Second, determinations of optimal laser scanner location and mirror location are performed based on the developed geometrical model. To validate the proposed registration-free as-is BIM generation technique, simulation tests are conducted on key construction components including a PC slab and a structural wall. The result demonstrates that the registration-free point cloud data acquisition technique can be applicable in various construction elements including PC elements and structural components for as-is BIM generation.

  • PDF

An Energy Optimization Technique for Latency and Quality Constrained Video Applications (지연 시간 및 화질 제약이 있는 비디오 응용을 위한 에너지 최적화 기법)

  • 임채석;하순회
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.10
    • /
    • pp.543-552
    • /
    • 2004
  • This paper proposes an energy optimization technique for latency and quality constrained video applications. It consists of two key techniques: frame-skipping technique and buffering technique. While buffering increases the slack time utilization at the OS level. frame skipping Increases the slack time itself at the application level, and both enhance the effectiveness of the dynamic voltage scaling technique. We use an H.263 encoder application as a test vehicle to which the proposed technique is applied. Experiments demonstrate that the proposed technique achieves noticeable energy reduction satisfying the given latency and video quality constraints.

Development and Performance Evaluation of a Concurrency Control Technique in Object-Oriented Database Systems

  • Jun, Woochun;Hong, Suk-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1899-1911
    • /
    • 2018
  • In this work, we propose a concurrency control scheme in object-oriented database (OODB). Since an OODB provides complex modeling power than the conventional relational databases, a concurrency control technique in OODB is also rather complicated and has influence on the overall performance. Thus, it is very important to develop a concurrency control technique with less overhead. The proposed scheme deals with class hierarchy that is a key concept in OODBs. The proposed scheme is developed on implicit locking scheme. Also, the proposed scheme is designed using data access frequency in order to reduce locking overhead than implicit locking. It means that, if access frequency information is not available, the proposed scheme works just like the existing implicit locking, In our work, the correctness of the proposed scheme is proved. The performance is analyzed depending on access types. Also, it is proved that our scheme performs works much better than the implicit locking does.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

A Research on the Magnitude/Phase Asymmetry Measurement Technique of the RF Power Amplifier Based on the Predistortive Tone Cancellation Technique

  • Choi, Heung-Jae;Shim, Sung-Un;Kim, Young-Gyu;Jeong, Yong-Chae;Kim, Chul-Dong
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.2
    • /
    • pp.73-77
    • /
    • 2010
  • This paper proposes a novel memory effect measurement technique in RF power amplifiers(PAs) using a two-tone intermodulation distortion(IMD) signal with a very simple and intuitive algorithm. Based on the proposed predistortive tone cancellation technique, the proposed measurement method is capable of measuring the relative phase and magnitude of the third-order and fifth-order IMDs, as well as the fundamental signal. The measured relative phase between the higher and lower IMD signal for specific tone spacing can be interpreted as the group delay(GD) information of the IMD signal concerned. From the group delay analysis, we can conclude that an adaptive control of GD as well as the magnitude and phase is a key function in increasing the linearization bandwidth and the dynamic range in a predistortion(PD) technique.

Preconditioning technique for a simultaneous solution to wind-membrane interaction

  • Sun, Fang-jin;Gu, Ming
    • Wind and Structures
    • /
    • v.22 no.3
    • /
    • pp.349-368
    • /
    • 2016
  • A preconditioning technique is presented for a simultaneous solution to wind-membrane interaction. In the simultaneous equations, a linear elastic model was employed to deal with the fluid-structure data transfer at the interface. A Lagrange multiplier was introduced to impose the specified boundary conditions at the interface and strongly coupled simultaneous equations are derived after space and time discretization. An initial linear elastic model preconditioner and modified one were derived by treating the linearized elastic model equation as a saddle point problem, respectively. Accordingly, initial and modified fluid-structure interaction (FSI) preconditioner for the simultaneous equations were derived based on the initial and modified linear elastic model preconditioners, respectively. Wind-membrane interaction analysis by the proposed preconditioners, for two and three dimensional membranous structures respectively, was performed. Comparison was made between the performance of initial and modified preconditioners by comparing parameters such as iteration numbers, relative residuals and convergence in FSI computation. The results show that the proposed preconditioning technique greatly improves calculation accuracy and efficiency. The priority of the modified FSI preconditioner is verified. The proposed preconditioning technique provides an efficient solution procedure and paves the way for practical application of simultaneous solution for wind-structure interaction computation.

Anti-melanogenesis Effect of Canavalia lineata Extract (해녀콩(Canavalia lineata THUNB. DC.) 추출물의 멜라닌 생성 억제 효과)

  • Bu Hee-Jung;Riu Key-Zung;Lee Sunjoo
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.30 no.4 s.48
    • /
    • pp.485-489
    • /
    • 2004
  • Melanin pigmentation in human skin is a major defensive mechanism against ultraviolet light of the sun. Tyrosinase plays a key role in the biosynthesis of melanin. This is why many researches have been focused on regulations in controlling the epidermal melanization. We found that extract of Canavalia lineata inhibits mushroom tyrosinase activity, dopa oxidase activity, and melanin synthesis in B16F10 melanoma cells. To elucidate mRNA level reverse transcription polymerase chain reaction (RT-PCR) technique was used. It was revealed that A subfraction of $CHCI_3$ extract of Canavalia lineara reduced the tyrosinase mRNA expression of B16F10 melanoma cells by reverse transcription polymerase chain reaction (RT-PCR) technique.

Shift and Noise Tolerance Encryption System using a Phase-Based Virtual Image (가상위상영상을 이용한 잡음 및 변이에 강한 암호화 시스템)

  • 서동환;김수중
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.9
    • /
    • pp.658-665
    • /
    • 2003
  • In this paper, we propose an improved image encryption and the shift-tolerance method in the Fourier space using a virtual phase image. The encrypted image is obtained by the Fourier transform of the product of a phase-encoded virtual image, not an original image, and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. The decryption technique is simply performed by inverse Fourier transform of the interference pattern between the encrypted image and the Fourier decrypting key, made of proposed phase assignment rule, in frequency domain. We demonstrate the robustness to noise, to data loss and shift of the encrypted image or the Fourier decryption key in the proposed technique.