• Title/Summary/Keyword: Computational Cost

Search Result 1,636, Processing Time 0.031 seconds

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

A Study on Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID (13.56Mhz RFID 환경에서 안전한 보안 스킴 구축을 위한 암호 스킴 및 보안 프로토콜 연구)

  • Kang, Jung-Ho;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1393-1401
    • /
    • 2013
  • What is RFID Microchip tag attached to an object, the reader recognizes technology collectively, through communication with the server to authenticate the object. A variety of RFID tags, 13.56Mhz bandwidth RFID card, ISO/IEC 14443 standards based on NXP's Mifare tag occupies 72.5% of the world market. Of the Mifare tags, low cost tag Mifare Classic tag provided in accordance with the limited hardware-based security operations, protocol leaked by a variety of attacks and key recovery vulnerability exists. Therefore, in this paper, Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID have been designed. The proposed security scheme that KS generated by various fixed values and non-fixed value, S-Box operated, values crossed between LFSR and S-Box is fully satisfied spoofing, replay attacks, such as vulnerability of existing security and general RFID secure requirement. Also, It is designed by considering the limited hardware computational capabilities and existing security schemes, so it could be suit to Mifare Classic now.

Pattern Analysis of Personalized ECG Signal by Q, R, S Peak Variability (Q, R, S 피크 변화에 따른 개인별 ECG 신호의 패턴 분석)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong;Kim, Joo-Man;Kim, Seon-Jong;Kim, Byoung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.192-200
    • /
    • 2015
  • Several algorithms have been developed to classify arrhythmia which rely on specific ECG(Electrocardiogram) database. Nevertheless personalized difference of ECG signal exist, performance degradation occurs because of carrying out diagnosis by general classification rule. Most methods require accurate detection of P-QRS-T point, higher computational cost and larger processing time. But it is difficult to detect the P and T wave signal because of person's individual difference. Therefore it is necessary to classify the pattern by analyzing personalized ECG signal and extracting minimal feature. Thus, QRS pattern Analysis of personalized ECG Signal by Q, R, S peak variability is presented in this paper. For this purpose, we detected R wave through the preprocessing method and extract eight feature by amplitude and phase variability. Also, we classified nine pattern in realtime through peak and morphology variability. PVC, PAC, Normal, LBBB, RBBB, Paced beat arrhythmia is evaluated by using 43 record of MIT-BIH arrhythmia database. The achieved scores indicate the average of 93.72% in QRS pattern detection classification.

Development of Outer Support Ring using Complex Forging Processes (복합단조 공정을 적용한 Outer Support Ring 개발)

  • Ju, Won Hong;Park, Sung-young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.653-659
    • /
    • 2017
  • In this study, the complex forging process of an outer support ring was developed and the prototype was manufactured. The current process, hot forging and MCT machining, has a disadvantage of excessive material removal rates and longer machining hours. To overcome this disadvantage, a general shape is given through hot forging and the precision is achieved through cold forging. The complex forging process was developed with the minimal machining process. Forging analysis was carried out to design a forging process using the commercial program, Deform-3D. The hot and cold forging processes were set up based on the analyzed result. The mold and prototype were manufactured. Hardness, surface roughness, internal defect, the grain low line of the prototype were evaluated. The results showed no particular problems, and there were no problems in mass production. Using complex forging, the material was reduced by approximately 27 % compared to the process using hot forging and MCT machining. In addition, the production speed was improved 2.15 fold compared to that of hot forging and MCT machining. Through this study, a cost-effective process and mold design technology were established, which is expected to have positive effects on other related automotive parts production.

Fingerprint Pore Extraction Method using 1D Gaussian Model (1차원 가우시안 모델을 이용한 지문 땀샘 추출 방법)

  • Cui, Junjian;Ra, Moonsoo;Kim, Whoi-Yul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.135-144
    • /
    • 2015
  • Fingerprint pores have proven to be useful features for fingerprint recognition and several pore-based fingerprint recognition systems have been reported recently. In order to recognize fingerprints using pore information, it is very important to extract pores reliably and accurately. Existing pore extraction methods utilize 2D model fitting to detect pore centers. This paper proposes a pore extraction method using 1D Gaussian model which is much simpler than 2D model. During model fitting process, 1D model requires less computational cost than 2D model. The proposed method first calculates local ridge orientation; then, ridge mask is generated. Since pore center is brighter than its neighboring pixels, pore candidates are extracted using a $3{\times}3$ filter and a $5{\times}5$ filter successively. Pore centers are extracted by fitting 1D Gaussian model on the pore candidates. Extensive experiments show that the proposed pore extraction method can extract pores more effectively and accurately than other existing methods, and pore matching results show the proposed pore extraction method could be used in fingerprint recognition.

Biogenic fabrication and characterization of silver nanoparticles using aqueous-ethanolic extract of lichen (Usnea longissima) and their antimicrobial activity

  • Siddiqi, Khwaja Salahuddin;Rashid, M.;Rahman, A.;Tajuddin, Tajuddin;Husen, Azamal;Rehman, Sumbul
    • Biomaterials Research
    • /
    • v.22 no.4
    • /
    • pp.328-336
    • /
    • 2018
  • Background: Biogenic fabrication of silver nanoparticles from naturally occurring biomaterials provides an alternative, eco-friendly and cost-effective means of obtaining nanoparticles. It is a favourite pursuit of all scientists and has gained popularity because it prevents the environment from pollution. Our main objective to take up this project is to fabricate silver nanoparticles from lichen, Usnea longissima and explore their properties. In the present study, we report a benign method of biosynthesis of silver nanoparticles from aqueous-ethanolic extract of Usnea longissima and their characterization by ultraviolet-visible (UV-vis), Fourier transform infrared (FTIR) spectroscopy, transmission electron microscopy (TEM) and scanning electron microscopy (SEM) analyses. Silver nanoparticles thus obtained were tested for antimicrobial activity against gram positive bacteria and gram negative bacteria. Results: Formation of silver nanoparticles was confirmed by the appearance of an absorption band at 400 nm in the UV-vis spectrum of the colloidal solution containing both the nanoparticles and U. longissima extract. Poly(ethylene glycol) coated silver nanoparticles showed additional absorption peaks at 424 and 450 nm. FTIR spectrum showed the involvement of amines, usnic acids, phenols, aldehydes and ketones in the reduction of silver ions to silver nanoparticles. Morphological studies showed three types of nanoparticles with an abundance of spherical shaped silver nanoparticles of 9.40-11.23 nm. Their average hydrodynamic diameter is 437.1 nm. Results of in vitro antibacterial activity of silver nanoparticles against Staphylococcus aureus, Streptococcus mutans, Streptococcus pyrogenes, Streptococcus viridans, Corynebacterium xerosis, Corynebacterium diphtheriae (gram positive bacteria) and Escherichia coli, Klebsiella pneuomoniae and Pseudomonas aeruginosa (gram negative bacteria) showed that it was effective against tested bacterial strains. However, S. mutans, C. diphtheriae and P. aeruginosa were resistant to silver nanoparticles. Conclusion: Lichens are rarely exploited for the fabrication of silver nanoparticles. In the present work the lichen acts as reducing as well as capping agent. They can therefore, be used to synthesize metal nanoparticles and their size may be controlled by monitoring the concentration of extract and metal ions. Since they are antibacterial they may be used for the treatment of bacterial infections in man and animal. They can also be used in purification of water, in soaps and medicine. Their sustained release may be achieved by coating them with a suitable polymer. Silver nanoparticles fabricated from edible U. longissima are free from toxic chemicals and therefore they can be safely used in medicine and medical devices. These silver nanoparticles were stable for weeks therefore they can be stored for longer duration of time without decomposition.

A Study on Optimization of the Global-Correlation-Based Objective Function for the Simultaneous-Source Full Waveform Inversion with Streamer-Type Data (스트리머 방식 탐사 자료의 동시 송신원 전파형 역산을 위한 Global correlation 기반 목적함수 최적화 연구)

  • Son, Woo-Hyun;Pyun, Suk-Joon;Jang, Dong-Hyuk;Park, Yun-Hui
    • Geophysics and Geophysical Exploration
    • /
    • v.15 no.3
    • /
    • pp.129-135
    • /
    • 2012
  • The simultaneous-source full waveform inversion improves the applicability of full waveform inversion by reducing the computational cost. Since this technique adopts simultaneous multi-source for forward modeling, unwanted events remain in the residual seismograms when the receiver geometry of field acquisition is different from that of numerical modeling. As a result, these events impede the convergence of the full waveform inversion. In particular, the streamer-type data with limited offsets is the most difficult data to apply the simultaneous-source technique. To overcome this problem, the global-correlation-based objective function was suggested and it was successfully applied to the simultaneous-source full waveform inversion in time domain. However, this method distorts residual wavefields due to the modified objective function and has a negative influence on the inversion result. In addition, this method has not been applied to the frequency-domain simultaneous-source full waveform inversion. In this paper, we apply a timedamping function to the observed and modeled data, which are used to compute global correlation, to minimize the distortion of residual wavefields. Since the damped wavefields optimize the performance of the global correlation, it mitigates the distortion of the residual wavefields and improves the inversion result. Our algorithm incorporates the globalcorrelation-based full waveform inversion into the frequency domain by back-propagating the time-domain residual wavefields in the frequency domain. Through the numerical examples using the streamer-type data, we show that our inversion algorithm better describes the velocity structure than the conventional global correlation approach does.

Development of Valuation Framework for Estimating the Market Value of Media Contents (미디어 콘텐츠의 시장가치 산정을 위한 가치평가 프레임워크 개발)

  • Sung, Tae-Eung;Park, Hyun-Woo
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.29-40
    • /
    • 2016
  • Since the late 20th century, there has been much effort to improve the market value of media contents which are commercialized in a digital format, by fusing digital data of video, audio, numerals, characters with IT technology together. Then by what criteria and methodologies could the market value for the drama "Sons of the Sun" or the animated film 'Frozen', often referred to in the meida, be estimated? In the circumstances there has been little or no research on the valuation framework of media contents and the status of their valuation system development to date, we propose a practical valuation models for various purposes such as contents trading, review of investment adequacy, etc., by formalizing and presenting a contents valuation framework for the four types of media of movies, online games, and broadcasting commercials, and animations. Therefore, we develope computational methods of cash flows which includes production cost by media content types, provide reference databases associated with key variables of valuation (economic life cycle, discount rates, contents contribution and royalty rates), and finally propose the valuation framework of media contents based on both income approach and relief-from-royalty method which has been applied to valuation of intangible assets so far.

Dimensionality Reduction of Feature Set for API Call based Android Malware Classification

  • Hwang, Hee-Jin;Lee, Soojin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.41-49
    • /
    • 2021
  • All application programs, including malware, call the Application Programming Interface (API) upon execution. Recently, using those characteristics, attempts to detect and classify malware based on API Call information have been actively studied. However, datasets containing API Call information require a large amount of computational cost and processing time. In addition, information that does not significantly affect the classification of malware may affect the classification accuracy of the learning model. Therefore, in this paper, we propose a method of extracting a essential feature set after reducing the dimensionality of API Call information by applying various feature selection methods. We used CICAndMal2020, a recently announced Android malware dataset, for the experiment. After extracting the essential feature set through various feature selection methods, Android malware classification was conducted using CNN (Convolutional Neural Network) and the results were analyzed. The results showed that the selected feature set or weight priority varies according to the feature selection methods. And, in the case of binary classification, malware was classified with 97% accuracy even if the feature set was reduced to 15% of the total size. In the case of multiclass classification, an average accuracy of 83% was achieved while reducing the feature set to 8% of the total size.

A Study on Stealth Design for Exterior Equipment Arrangement Considering the Multi-Bounce Effect (다중반사를 고려한 함정의 외부 탑재 장비 최적배치 연구)

  • Hwang, Joon-Tae;Hong, Suk-Yoon;Kwon, Hyun-Wung;Kim, Jong-Chul;Song, Jee-Hun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.7
    • /
    • pp.918-925
    • /
    • 2017
  • Multiple reflections on exterior equipment with complex shape on naval ships cause unexpectedly high Radar Cross Section (RCS) distributions, and the directions of reradiated electromagnetic waves are hard to predict. Therefore, the optimum arrangement of exterior equipments should be considered according to the Radar Absorbing Structure (RAS) method. In this paper, the optimum arrangement for exterior equipments was determined to reduce multiple reflections and RCS even with complex shapes. The sequential descending arrangement method was used to establish an optimum arrangement algorithm. An LCS-2 type model was selected for optimum exterior equipment arrangements. In order to reduce computational cost, RCS distributions and multiple reflection path analysis of exterior equipments was carried out to select exterior equipments for optimum arrangement, and an optimum arrangement was determined to find positions with minimum RCS values. Also, the RCS reduction effect was analyzed using detectable radar range.