• Title/Summary/Keyword: Engineering Identities

Search Result 94, Processing Time 0.026 seconds

New Fast and Cost effective Chien Search Machine Design Using Galois Subfield Transformation (갈로이스 부분장 변환을 이용한 새로운 고속의 경제적 치엔탐색기의 설계법에 대하여)

  • An, Hyeong-Keon;Hong, Young-Jin;Kim, Jin-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.61-67
    • /
    • 2007
  • In Reed Solomon decoder, when there are more than 4 error symbols, we usually use Chien search machine to find those error positions. In this case, classical method requires complex and relatively slow digital circuitry to implement it. In this paper we propose New fast and cost effective Chien search machine design method using Galois Subfield transformation. Example is given to show the method is working well. This new design can be applied to the case where there are more than 5 symbol errors in the Reed-Solomon code word.

Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs

  • Ko, Doo-Hyun;Kim, Bum-Jin;An, Sun-Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.776-796
    • /
    • 2010
  • Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In integrated RFID-WSNs, the reader collision is one of the critical problems. Above all, due to the absence of universally applicable anti-collision protocols and the channel capture phenomenon, the medium access control protocols in integrated RFID-WSNs suffer from reader collision and starvation problems. In this paper, we propose an efficient MAC protocol, called EMP, to avoid the above problems in integrated RFID-WSNs. EMP is a CSMA-based MAC protocol which is compatible with sensor networks operating on integrated nodes which consist of an RFID reader and a senor node. EMP resolves not only the reader collision problem, but also the starvation problem using a power control mechanism. To verify the performance of EMP, we compared it with other anti-reader collision MAC protocols using simulations. As a result, the performance of EMP showed improvements in throughput, system efficiency, and energy consumption compared to the single data channel protocols (CSMA/CA, Pulse, and DiCa) in dense deployment environments.

A POWER SERIES ASSOCIATED WITH THE GENERALIZED HYPERGEOMETRIC FUNCTIONS WITH THE UNIT ARGUMENT WHICH ARE INVOLVED IN BELL POLYNOMIALS

  • Choi, Junesang;Qureshi, Mohd Idris;Majid, Javid;Ara, Jahan
    • Nonlinear Functional Analysis and Applications
    • /
    • v.27 no.1
    • /
    • pp.169-187
    • /
    • 2022
  • There have been provided a surprisingly large number of summation formulae for generalized hypergeometric functions and series incorporating a variety of elementary and special functions in their various combinations. In this paper, we aim to consider certain generalized hypergeometric function 3F2 with particular arguments, through which a number of summation formulas for p+1Fp(1) are provided. We then establish a power series whose coefficients are involved in generalized hypergeometric functions with unit argument. Also, we demonstrate that the generalized hypergeometric functions with unit argument mentioned before may be expressed in terms of Bell polynomials. Further, we explore several special instances of our primary identities, among numerous others, and raise a problem that naturally emerges throughout the course of this investigation.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

A Maximum A Posterior Probability based Multiuser Detection Method in Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.51-56
    • /
    • 2022
  • In space based constellation network, users are allowed to enter or leave the network arbitrarily. Hence, the number, identities and transmitted data of active users vary with time and have considerable impacts on the receiver's performance. The so-called problem of multiuser detection means identifying the identity of each active user and detecting the data transmitted by each active user. Traditional methods assume that the number of active users is equal to the maximum number of users that the network can hold. The model of traditional methods are simple and the performance are suboptimal. In this paper a Maximum A Posteriori Probability (MAP) based multiuser detection method is proposed. The proposed method models the activity state of users as Markov chain and transforms multiuser detection into searching optimal path in grid map with BCJR algorithm. Simulation results indicate that the proposed method obtains 2.6dB and 1dB Eb/N0 gains respectively when activity detection error rate and symbol error rate reach 10-3, comparing with reference methods.

Proteomic Analysis and Extensive Protein Identification from Dry, Germinating Arabidopsis Seeds and Young Seedlings

  • Fu, Qiang;Wang, Bai-Chen;Jin, Xiang;Li, Hong-Bing;Han, Pei;Wei, Kai-Hua;Zhang, Xue-Min;Zhu, Yu-Xian
    • BMB Reports
    • /
    • v.38 no.6
    • /
    • pp.650-660
    • /
    • 2005
  • Proteins accumulated in dry, stratified Arabidopsis seeds or young seedlings, totaled 1100 to 1300 depending on the time of sampling, were analyzed by using immobilized pH gradient 2-DE gel electrophoresis. The molecular identities of 437 polypeptides, encoded by 355 independent genes, were determined by MALDI-TOF or TOF-TOF mass spectrometry. In the sum, 293 were present at all stages and 95 were accumulated during the time of radicle protrusion while another 18 appeared in later stages. Further analysis showed that 226 of the identified polypeptides could be located in different metabolic pathways. Proteins involved in carbohydrate, energy and amino acid metabolism constituted to about 1/4, and those involved in metabolism of vitamins and cofactors constituted for about 3% of the total signal intensity in gels prepared from 72 h seedlings. Enzymes related to genetic information processing increased very quickly during early imbibition and reached highest level around 30 h of germination.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Empirical Study on Perception of Musically Inspired Architectural Façades - Music and Architecture

  • Yoo, Saewon;Choi, Jaepil
    • Architectural research
    • /
    • v.23 no.3
    • /
    • pp.39-48
    • /
    • 2021
  • Inspiration plays an essential role in architectural design process that compels architects to bring their ideas into final product by engaging in creative thinking. The relation in between architecture and music has been one of combination throughout architectural history used as inspirations for façade's forms and shapes, space configurations and arrangements, and etc. Applying music in architecture produces creative and scientific design methods, provides attractions for visitors, and reflects the social and cultural identities and changes of the particular period. This research aims to analyze the correlations between architecture and music in depth, and examine the perception of musically inspired architecture by empirical study. Five buildings that applied musical rhythms were chosen for survey questionnaires in order to observe how people majoring in architecture, music, and other fields perceive musically inspired architecture differently by matching the music with the building that correlate to each other. By examining the reasons that the respondents have selected such music with a building from the questionnaires, the keywords are extracted and interpreted. The results showed that it is possible for people to perceive music from architecture, and that it is suitable to use music as a source of inspiration in architectural designs.