• Title/Summary/Keyword: A key technique

Search Result 1,745, Processing Time 0.036 seconds

A New Support Vector Machine Model Based on Improved Imperialist Competitive Algorithm for Fault Diagnosis of Oil-immersed Transformers

  • Zhang, Yiyi;Wei, Hua;Liao, Ruijin;Wang, Youyuan;Yang, Lijun;Yan, Chunyu
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.830-839
    • /
    • 2017
  • Support vector machine (SVM) is introduced as an effective fault diagnosis technique based on dissolved gases analysis (DGA) for oil-immersed transformers with maximum generalization ability; however, the applicability of the SVM is highly affected due to the difficulty of selecting the SVM parameters appropriately. Therefore, a novel approach combing SVM with improved imperialist competitive algorithm (IICA) for fault diagnosis of oil-immersed transformers was proposed in the paper. The improved ICA, which is proved to be an effective optimization approach, is employed to optimize the parameters of SVM. Cross validation and normalizations were applied in the training processes of SVM and the trained SVM model with the optimized parameters was established for fault diagnosis of oil-immersed transformers. Three classification benchmark sets were studied based on particle swarm optimization SVM (PSOSVM) and IICASVM with four multiple classification schemes to select the best scheme for transformer fault diagnosis. The results show that the proposed model can obtain higher diagnosis accuracy than other methods. The comparisons confirm that the proposed model is an effective approach for classification problems.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.

Robust Multi-Layer Hierarchical Model for Digit Character Recognition

  • Yang, Jie;Sun, Yadong;Zhang, Liangjun;Zhang, Qingnian
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.2
    • /
    • pp.699-707
    • /
    • 2015
  • Although digit character recognition has got a significant improvement in recent years, it is still challenging to achieve satisfied result if the data contains an amount of distracting factors. This paper proposes a novel digit character recognition approach using a multi-layer hierarchical model, Hybrid Restricted Boltzmann Machines (HRBMs), which allows the learning architecture to be robust to background distracting factors. The insight behind the proposed model is that useful high-level features appear more frequently than distracting factors during learning, thus the high-level features can be decompose into hybrid hierarchical structures by using only small label information. In order to extract robust and compact features, a stochastic 0-1 layer is employed, which enables the model's hidden nodes to independently capture the useful character features during training. Experiments on the variations of Mixed National Institute of Standards and Technology (MNIST) dataset show that improvements of the multi-layer hierarchical model can be achieved by the proposed method. Finally, the paper shows the proposed technique which is used in a real-world application, where it is able to identify digit characters under various complex background images.

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

A Study on Mobile Web App Quiz Contents Authoring Model based on Gamification (게이미피케이션 기반 모바일 웹 앱 퀴즈 콘텐츠 저작 모형 연구)

  • Lee, Jae-Won;Kim, Hyun-Suk
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1253-1262
    • /
    • 2018
  • In this study, we propose a development environment for authoring quiz contents, which is based on the concept of "Gamification", which is the principle of Engagement and Reward. Future Services As a platform for authoring and composing technology, and also for educational contents authoring, I have reviewed key features and implications of HTML5 (CSS3.0, Java Script, etc.) along with key technologies. These features are key technologies for building a true smart learning environment. Based on this, a case of applying the gamification technique to enhance the educational effect was proposed through the quiz contents model.

The effects of LNG-tank sloshing on the global motions of FLNG system

  • Hu, Zhi-Qiang;Wang, Shu-Ya;Chen, Gang;Chai, Shu-Hong;Jin, Yu-Ting
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.9 no.1
    • /
    • pp.114-125
    • /
    • 2017
  • This paper addresses a study of inner-tank sloshing effect on motion responses of a Floating Liquefied Natural Gas (FLNG) system, through experimental analysis and numerical modeling. To investigate hydrodynamic characteristics of FLNG under the conditions of with and without LNG-tank sloshing, a series of numerical simulations were carried out using potential flow solver SESAM. To validate the numerical simulations, model tests on the FLNG system was conducted in both liquid and solid ballast conditions with 75% tank filling level in height. Good correlations were observed between the measured and predicted results, proving the feasibility of the numerical modeling technique. On the verified numerical model, Response Amplitude Operators (RAOs) of the FLNG with 25% and 50% tank filling levels were calculated in six degrees of freedom. The influence of tank sloshing with varying tank filling levels on the RAOs has been presented and analyzed. The results showed that LNG-tank sloshing has a noticeable impact on the roll motion response of the FLNG and a moderate tank filling level is less helpful in reducing the roll motion response.

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks

  • Chen, Zhihong;Lin, Hai;Wang, Lusheng;Zhao, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1238-1259
    • /
    • 2019
  • Saving energy is a big challenge for Wireless Sensor Networks (WSNs), which becomes even more critical in large-scale WSNs. Most energy waste is communication related, such as collision, overhearing and idle listening, so the schedule-based access which can avoid these wastes is preferred for WSNs. On the other hand, clustering technique is considered as the most promising solution for topology management in WSNs. Hence, providing interference-free clustering is vital for WSNs, especially for large-scale WSNs. However, schedule management in cluster-based networks is never a trivial work, since it requires inter-cluster cooperation. In this paper, we propose a clustering method, called Interference-Free Clustering Protocol (IFCP), to partition a WSN into interference-free clusters, making timeslot management much easier to achieve. Moreover, we model the clustering problem as a multi-objective optimization issue and use non-dominated sorting genetic algorithm II to solve it. Our proposal is finally compared with two adaptive clustering methods, HEED-CSMA and HEED-BMA, demonstrating that it achieves the good performance in terms of delay, packet delivery ratio, and energy consumption.

Oral-Motor Facilitation Technique (OMFT): Part II-Conceptual Hierarchy and Key Point Technique (구강운동촉진기술: 2 부-개념적 위계 및 핵심 기법)

  • Min, Kyoung Chul;Seo, Sang Min;Woo, Hee-soon
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.1
    • /
    • pp.53-61
    • /
    • 2021
  • Introduction : OMFT is a therapeutic technique based on sensorimotor, motor control and motor learning, and its major goal is to improve oral motor function. The oral motor conceptual hierarchical development is divided into 5 steps: 1) sensorimotor, 2) movement integration, 3) structural movement, 4) functional oral motor, and 5) comprehensive oral motor. Discussion : The OMFT consists of 3 techniques, 10 categories, and 50 sub-item. 1) Warming up technique: 2 categories, 12 sub-item, warming up by sensory awareness and adaptation, therapy situation adaptation, neck movement; 2) Key point technique: 7 categories, 30 sub-item, oral motor facilitation and increasing chewing skill by direct stroke of oral structures such as the face, lips, cheeks, gum, jaws, and tongue; 3) Application technique: 1 category, 8 sub-item, facilitate food intake and swallowing. Conclusion : The goal of this article is to introduce 3 techniques, 50 sub-item of OMFT, as a comprehensive oral motor therapy method, for application to clients. This article provides information that will help oral motor specialists in treating clients with oral motor problems more effectively and professionally.