• Title/Summary/Keyword: Key issue

Search Result 1,218, Processing Time 0.026 seconds

An Authentication Mechanism Based on Clustering Architecture in Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크 환경에서 클러스터링 구조에 기반한 인증 메커니즘)

  • Lee, Tao;Shin, Young-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1461-1464
    • /
    • 2005
  • In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories, but those are not well-suited for securing ad hoc networks. Moreover, a fundamental issue of securing mobile ad hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal mechanism to construct the authentication service. Although this is already mature in the internet application, providing public key based authentication is still very challenging in mobile ad hoc networks. In this paper I propose a secure public key authentication service based on clustering model and trust model to protect nodes from getting false public keys of the others efficiently when there are malicious nodes in the network.

  • PDF

Mining Information in Automated Relational Databases for Improving Reliability in Forest Products Manufacturing

  • Young, Timothy M.;Guess, Frank M.
    • International Journal of Reliability and Applications
    • /
    • v.3 no.4
    • /
    • pp.155-164
    • /
    • 2002
  • This paper focuses on how modem data mining can be integrated with real-time relational databases and commercial data warehouses to improve reliability in real-time. An important Issue for many manufacturers is the development of relational databases that link key product attributes with real-time process parameters. Helpful data for key product attributes in manufacturing may be derived from destructive reliability testing. Destructive samples are taken at periodic time intervals during manufacturing, which might create a long time-gap between key product attributes and real-time process data. A case study is briefly summarized for the medium density fiberboard (MDF) industry. MDF is a wood composite that is used extensively by the home building and furniture manufacturing industries around the world. The cost of unacceptable MDF was as large as 5% to 10% of total manufacturing costs. Prevention can result In millions of US dollars saved by using better Information systems.

  • PDF

Localization of Subsurface Targets Based on Symmetric Sub-array MIMO Radar

  • Liu, Qinghua;He, Yuanxin;Jiang, Chang
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.774-783
    • /
    • 2020
  • For the issue of subsurface target localization by reverse projection, a new approach of target localization with different distances based on symmetric sub-array multiple-input multiple-output (MIMO) radar is proposed in this paper. By utilizing the particularity of structure of the two symmetric sub-arrays, the received signals are jointly reconstructed to eliminate the distance information from the steering vectors. The distance-independent direction of arrival (DOA) estimates are acquired, and the localizations of subsurface targets with different distances are realized by reverse projection. According to the localization mechanism and application characteristics of the proposed algorithm, the grid zooming method based on spatial segmentation is used to optimize the locaiton efficiency. Simulation results demonstrate the effectiveness of the proposed localization method and optimization scheme.

Colour Linear Array Image Enhancement Method with Constant Colour

  • Ji, Jing;Fang, Suping;Cheng, Zhiqiang
    • Current Optics and Photonics
    • /
    • v.6 no.3
    • /
    • pp.304-312
    • /
    • 2022
  • Digital images of cultural relics captured using line scan cameras present limitations due to uneven intensity and low contrast. To address this issue, this report proposes a colour linear array image enhancement method that can maintain a constant colour. First, the colour linear array image is converted from the red-green-blue (RGB) colour space into the hue-saturation-intensity colour space, and the three components of hue, saturation, and intensity are separated. Subsequently, the hue and saturation components are held constant while the intensity component is processed using the established intensity compensation model to eliminate the uneven intensity of the image. On this basis, the contrast of the intensity component is enhanced using an improved local contrast enhancement method. Finally, the processed image is converted into the RGB colour space. The experimental results indicate that the proposed method can significantly improve the visual effect of colour linear array images. Moreover, the objective quality evaluation parameters are improved compared to those determined using existing methods.

Analysis of DDS Sampling Method and Harmonic Composition

  • Zhi-lai Zhang;Shao-jun Jiang;Li-li Liang
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Through theoretical proof and algorithm design, this paper numerically demonstrates that the three sampling methods of DDS are equivalent in amplitude-frequency characteristics. Depending on theoretical analysis, the article obtains the conclusion that 2 points are optimal when sampling at 2, 3, and 4 points. Built on the data results, this paper obtains the fractional form of the amplitude and phase of the DDS sampled signal; in addition, this paper also obtains the design parameters of the DDS post-stage filter. It also gives a control method for the calculation error when addressing this issue.

A Modified Capacitor Current Feedback Active Damping Approach for Grid Connected Converters with an LCL Filter

  • Wan, Zhiqiang;Xiong, Jian;Lei, Ji;Chen, Chen;Zhang, Kai
    • Journal of Power Electronics
    • /
    • v.15 no.5
    • /
    • pp.1286-1294
    • /
    • 2015
  • Capacitor current feedback active damping is extensively used in grid-connected converters with an LCL filter. However, systems tends to become unstable when the digital control delay is taken into account, especially in low switching frequencies. This paper discusses this issue by deriving a discrete model with a digital control delay and by presenting the stable region of an active damping loop from high to low switching frequencies. In order to overcome the disadvantage of capacitor current feedback active damping, this paper proposes a modified approach using grid current and converter current for feedback. This can expand the stable region and provide sufficient active damping whether in high or low switching frequencies. By applying the modified approach, the active damping loop can be simplified from fourth-order into second-order, and the design of the grid current loop can be simplified. The modified approach can work well when the grid impedance varies. Both the active damping performance and the dynamic performance of the current loop are verified by simulations and experimental results.

A Comprehensive Study on Key Components of Grayscale-based Deepfake Detection

  • Seok Bin Son;Seong Hee Park;Youn Kyu Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2230-2252
    • /
    • 2024
  • Advances in deep learning technology have enabled the generation of more realistic deepfakes, which not only endanger individuals' identities but also exploit vulnerabilities in face recognition systems. The majority of existing deepfake detection methods have primarily focused on RGB-based analysis, offering unreliable performance in terms of detection accuracy and time. To address the issue, a grayscale-based deepfake detection method has recently been proposed. This method significantly reduces detection time while providing comparable accuracy to RGB-based methods. However, despite its significant effectiveness, the "key components" that directly affect the performance of grayscale-based deepfake detection have not been systematically analyzed. In this paper, we target three key components: RGB-to-grayscale conversion method, brightness level in grayscale, and resolution level in grayscale. To analyze their impacts on the performance of grayscale-based deepfake detection, we conducted comprehensive evaluations, including component-wise analysis and comparative analysis using real-world datasets. For each key component, we quantitatively analyzed its characteristics' performance and identified differences between them. Moreover, we successfully verified the effectiveness of an optimal combination of the key components by comparing it with existing deepfake detection methods.

Life Cycle Assessment on the End-of-Life Vehicle Treatment System in Korea (국내 폐자동차 처리시스템에 대한 전과정평가)

  • Hong, Seok-Jin;Jeong, Kee-Mo;Hong, John-Hee;Yun, Ju-Ho;Hur, Tak
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.105-112
    • /
    • 2005
  • This study aims at evaluating the environmental impacts stemmed from the End-of-Life Vehicle(ELV) treatment systems in Korea, using Life Cycle Assessment(LCA) method. In this study, both environmental burden from the ELV dismantling process & recycling processes and environmental benefit which were derived from the avoided environmental impacts by substituting recycled materials for virgin materials were considered. First of all, the key issues which were defined as the environmental aspects that account for more than $1\%$ out of the total environmental impacts were identified from the Life Cycle Impact Assessment(LCIA). $CO_2$, crude oil, natural gas, coal, etc. were found out to be the key issue parameters. From the LCI Analysis and LCIA studies, it was shown that the significant environmental aspects were related with the recycling process of ferro scrap, the shredding process of compressed car bodies and the dismantling process of end-of-life engines. In particular, the recycling process of ferro scrap has the most significant effects on the environmental impacts of the ELV treatment systems. Based on these results, it is recommended to improve the recycling process of ferro scrap in order to make the ELV treatment systems more environmentally sound.

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

An Energy Efficient Group-Based Cluster Key Management for Large Scale Sensor Networks (대규모 센서 네트워크에서 그룹을 기반으로 한 에너지 효율적인 클러스터키 관리 방안)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5487-5495
    • /
    • 2012
  • The important issue that applies security key are secure rekeying, processing time and cost reduction. Because of sensor node's limited energy, energy consumption for rekeying affects lifetime of network. Thus it is necessary a secure and efficient security key management method. In this paper, I propose an energy efficient group-based cluster key management (EEGCK) in the large scale sensor networks. EEGCK uses five security key for efficient key management and different polynomial degree using security fitness function of sector, cluster and group is applied for rekeying and security processing. Through both analysis and simulation, I also show that proposed EEGCK is better than previous security management method at point of network energy efficiency.