• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.029 seconds

Power line interference noise elimination method based on independent component analysis in wavelet domain for magnetotelluric signal

  • Cao, Xiaoling;Yan, Liangjun
    • Geosystem Engineering
    • /
    • v.21 no.5
    • /
    • pp.251-261
    • /
    • 2018
  • With the urbanization in recent years, the power line interference noise in electromagnetic signal is increasing day by day, and has gradually become an unavoidable component of noises in magnetotelluric signal detection. Therefore, a kind of power line interference noise elimination method based on independent component analysis in wavelet domain for magnetotelluric signal is put forward in this paper. The method first uses wavelet decomposition to change single-channel signal into multi-channel signal, and then takes advantage of blind source separation principle of independent component analysis to eliminate power line interference noise. There is no need to choose the layer number of wavelet decomposition and the wavelet base of wavelet decomposition according to the observed signal. On the treatment effect, it is better than the previous power line interference removal method based on independent component analysis. Through the de-noising processing to actual magnetotelluric measuring data, it is shown that this method makes both the apparent resistivity curve near 50 Hz and the phase curve near 50 Hz become smoother and steadier than before processing, i.e., it effectively eliminates the power line interference noise.

A Secure AES Implementation Method Resistant to Fault Injection Attack Using Differential Property Between Input and Output (입.출력 차분 특성을 이용한 오류 주입 공격에 강인한 AES 구현 방안)

  • Park, Jeong-Soo;Choi, Yong-Je;Choi, Doo-Ho;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1009-1017
    • /
    • 2012
  • The fault injection attack has been developed to extract the secret key which is embedded in a crypto module by injecting errors during the encryption process. Especially, an attacker can find master key of AES using injection of just one byte. In this paper, we proposed a countermeasure resistant to the these fault attacks by checking the differences between input and output. Using computer simulation, we also verified that the proposed AES implementation resistant to fault attack shows better fault detection ratio than previous other methods and has small computational overheads.

Mechanical behavior of sandstones under water-rock interactions

  • Zhou, Kunyou;Dou, Linming;Gong, Siyuan;Chai, Yanjiang;Li, Jiazhuo;Ma, Xiaotao;Song, Shikang
    • Geomechanics and Engineering
    • /
    • v.29 no.6
    • /
    • pp.627-643
    • /
    • 2022
  • Water-rock interactions have a significant influence on the mechanical behavior of rocks. In this study, uniaxial compression and tension tests on different water-treated sandstone samples were conducted. Acoustic emission (AE) monitoring and micro-pore structure detection were carried out. Water-rock interactions and their effects on rock mechanical behavior were discussed. The results indicate that water content significantly weakens rock mechanical strength. The sensitivity of the mechanical parameters to water treatment, from high to low, are Poisson ratio (𝜇), uniaxial tensile strength (UTS), uniaxial compressive strength (UCS), elastic modulus (E), and peak strain (𝜀). After water treatment, AE activities and the shear crack percentage are reduced, the angles between macro fractures and loading direction are minimized, the dynamic phenomenon during loading is weakened, and the failure mode changes from a mixed tensile-shear type to a tensile one. Due to the softening, lubrication, and water wedge effects in water-rock interactions, water content increases pore size, promotes crack development, and weakens micro-pore structures. Further damage of rocks in fractured and caved zones due to the water-rock interactions leads to an extra load on the adjoining coal and rock masses, which will increase the risk of dynamic disasters.

Dynamic analyses for an axially-loaded pile in a transverse-isotropic, fluid-filled, poro-visco-elastic soil underlain by rigid base

  • Zhang, Shiping;Zhang, Junhui;Zeng, Ling;Yu, Cheng;Zheng, Yun
    • Geomechanics and Engineering
    • /
    • v.29 no.1
    • /
    • pp.53-63
    • /
    • 2022
  • Simplified analytical solutions are developed for the dynamic analyses of an axially loaded pile foundation embedded in a transverse-isotropic, fluid-filled, poro-visco-elastic soil with rigid substratum. The pile is modeled as a viscoelastic Rayleigh-Love rod, while the surrounding soil is regarded as a transversely isotropic, liquid-saturated, viscoelastic, porous medium of which the mechanical behavior is represented by the Boer's poroelastic media model and the fractional derivative model. Upon the separation of variables, the frequency-domain responses for the impedance function of the pile top, and the vertical displacement and the axial force along the pile shaft are gained. Then by virtue of the convolution theorem and the inverse Fourier transform, the time-domain velocity response of the pile head is derived. The presented solutions are validated, compared to the existing solution, the finite element model (FEM) results, and the field test data. Parametric analyses are made to show the effect of the soil anisotropy and the excitation frequency on the pile-soil dynamic responses.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

Analyzing Key Variables in Network Attack Classification on NSL-KDD Dataset using SHAP (SHAP 기반 NSL-KDD 네트워크 공격 분류의 주요 변수 분석)

  • Sang-duk Lee;Dae-gyu Kim;Chang Soo Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.924-935
    • /
    • 2023
  • Purpose: The central aim of this study is to leverage machine learning techniques for the classification of Intrusion Detection System (IDS) data, with a specific focus on identifying the variables responsible for enhancing overall performance. Method: First, we classified 'R2L(Remote to Local)' and 'U2R (User to Root)' attacks in the NSL-KDD dataset, which are difficult to detect due to class imbalance, using seven machine learning models, including Logistic Regression (LR) and K-Nearest Neighbor (KNN). Next, we use the SHapley Additive exPlanation (SHAP) for two classification models that showed high performance, Random Forest (RF) and Light Gradient-Boosting Machine (LGBM), to check the importance of variables that affect classification for each model. Result: In the case of RF, the 'service' variable and in the case of LGBM, the 'dst_host_srv_count' variable were confirmed to be the most important variables. These pivotal variables serve as key factors capable of enhancing performance in the context of classification for each respective model. Conclusion: In conclusion, this paper successfully identifies the optimal models, RF and LGBM, for classifying 'R2L' and 'U2R' attacks, while elucidating the crucial variables associated with each selected model.

Acoustic emission localization in concrete using a wireless air-coupled monitoring system

  • Yunshan Bai;Yuanxue Liu;Guangjian Gao;Shuang Su
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.195-205
    • /
    • 2023
  • The contact acoustic emission (AE) monitoring system is time-consuming and costly for monitoring concrete structures in large scope, in addition, the great difference in acoustic impedance between air and concrete makes the detection process inconvenient. In this work, we broaden the conventional AE source localization method for concrete to the non-contact (air-coupled) micro-electromechanical system (MEMS) microphones array, which collects the energy-rich leaky Rayleigh waves, instead of the relatively weak P-wave. Finite element method was used for the numerical simulations, it is shown that the propagation velocity of leaky Rayleigh waves traveling along the air-concrete interface agrees with the corresponding theoretical properties of Lamb wave modes in an infinite concrete slab. This structures the basis for implementing a non-contact AE source location approach. Based on the experience gained from numerical studies, experimental studies on the proposed air-coupled AE source location in concrete slabs are carried out. Finally, it is shown that the locating map of AE source can be determined using the proposed system, and the accuracy is sufficient for most field monitoring applications on large plate-like concrete structures, such as tunnel lining and bridge deck.

Research Progress on Strategies for Improving the Enzyme Properties of Bacteriophage Endolysins

  • Yulu Wang;Xue Wang;Xin Liu;Bokun Lin
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.6
    • /
    • pp.1189-1196
    • /
    • 2024
  • Bacterial resistance to commonly used antibiotics is one of the major challenges to be solved today. Bacteriophage endolysins (Lysins) have become a hot research topic as a new class of antibacterial agents. They have promising applications in bacterial infection prevention and control in multiple fields, such as livestock and poultry farming, food safety, clinical medicine and pathogen detection. However, many phage endolysins display low bactericidal activities, short half-life and narrow lytic spectrums. Therefore, some methods have been used to improve the enzyme properties (bactericidal activity, lysis spectrum, stability and targeting the substrate, etc) of bacteriophage endolysins, including deletion or addition of domains, DNA mutagenesis, chimerization of domains, fusion to the membrane-penetrating peptides, fusion with domains targeting outer membrane transport systems, encapsulation, the usage of outer membrane permeabilizers. In this review, research progress on the strategies for improving their enzyme properties are systematically presented, with a view to provide references for the development of lysins with excellent performances.

System reliability assessment of hanger structure considering corrosion-fatigue coupling effect

  • Yang Ding;Chao-Dong Guan;Jian Zhou;Tian-Yun Chu;Xue-Song Zhang
    • Steel and Composite Structures
    • /
    • v.53 no.2
    • /
    • pp.145-153
    • /
    • 2024
  • The bridge hanger is exposed to cyclic loads, such as wind and vehicle loads, which can induce fatigue failure, significantly reducing its operational lifespan. Additionally, the hanger is prone to corrosion throughout transportation, construction, and operation. Although corrosion fatigue curves are typically derived from individual steel wire experiments, the bridge hanger comprises multiple parallel steel wires. Consequently, a corrosion fatigue curve based on a single wire may not accurately portray the hanger's longevity, and data solely at the component level may not encompass the overall system-level condition. To tackle this challenge, this paper introduces a series system-level reliability assessment framework based on dynamic Bayesian Networks, accounting for the interdependence between variables. Specifically, the framework encompasses a time-varying reliability model featuring three random parameters (corroded number, equivalent structural stress, and the total cycles number of wires) and leverages seven numerical simulation studies to investigate the impacts of these random parameters on system reliability.

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.