• Title/Summary/Keyword: Key-Recovery

Search Result 442, Processing Time 0.026 seconds

Majorization-Minimization-Based Sparse Signal Recovery Method Using Prior Support and Amplitude Information for the Estimation of Time-varying Sparse Channels

  • Wang, Chen;Fang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4835-4855
    • /
    • 2018
  • In this paper, we study the sparse signal recovery that uses information of both support and amplitude of the sparse signal. A convergent iterative algorithm for sparse signal recovery is developed using Majorization-Minimization-based Non-convex Optimization (MM-NcO). Furthermore, it is shown that, typically, the sparse signals that are recovered using the proposed iterative algorithm are not globally optimal and the performance of the iterative algorithm depends on the initial point. Therefore, a modified MM-NcO-based iterative algorithm is developed that uses prior information of both support and amplitude of the sparse signal to enhance recovery performance. Finally, the modified MM-NcO-based iterative algorithm is used to estimate the time-varying sparse wireless channels with temporal correlation. The numerical results show that the new algorithm performs better than related algorithms.

Camera Motion and Structure Recovery Using Two-step Sampling (2단계 샘플링을 이용한 카메라 움직임 및 장면 구조 복원)

  • 서정국;조청운;홍현기
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.347-356
    • /
    • 2003
  • Camera pose and scene geometry estimation from video sequences is widely used in various areas such as image composition. Structure and motion recovery based on the auto calibration algorithm can insert synthetic 3D objects in real but un modeled scenes and create their views from the camera positions. However, most previous methods require bundle adjustment or non linear minimization process [or more precise results. This paper presents a new auto' calibration algorithm for video sequence based on two steps: the one is key frame selection, and the other removes the key frame with inaccurate camera matrix based on an absolute quadric estimation by LMedS. In the experimental results, we have demonstrated that the proposed method can achieve a precise camera pose estimation and scene geometry recovery without bundle adjustment. In addition, virtual objects have been inserted in the real images by using the camera trajectories.

Recovery of People Living with Mental Illness: A Concept Analysis (정신질환의 회복[Recovery] 개념분석)

  • Yeu, Ki-Dong;Bernstein, Kun-Sook;Lee, Mi-Hyoung
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.19 no.1
    • /
    • pp.46-54
    • /
    • 2012
  • Purpose: The purpose of this study is to analyze the concept of recovery in relation to those living with mental illness and provide a better understanding to the definition, perspectives, and paradigm of recovery in phenomenon, as a conceptual knowledge. Methods: A literature review was conducted to define the concept of recovery from a mental illness by using key words, "recovery", "mental health and illness", "concept analysis" and "recovery-oriented nursing", and searching the Cumulative Index to Nursing and Allied Health Literature, PubMed, Cochrane library and RISS4U database. Concept analysis of recovery was done, by using the Walker and Avant's framework of concept analysis. Results: Attributes of recovery for those living with mental illness included regain, life reconstruction, hope, adjustment, and health. Antecedents of recovery from mental illness included instilling hope, recovery vision, belief, peer support, recovery-oriented services, empowerment, personal accountability, education, human rights and culture. The consequences, as meanings of recovery included self-esteem, hopeful life, positive adjustment, and healthy life. Conclusion: Concept of recovery is important for a nurse to understand when caring for a person living with mental illness. This concept of recovery from mental illness may apply to future studies to develop a recovery-oriented nursing intervention.

  • PDF

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Service Recovery Strategies in Internet Shopping Mall (인터넷 쇼핑몰에서의 서비스회복전략)

  • Kim, Gye-Su;Sin, Jong-Seop
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.11a
    • /
    • pp.267-274
    • /
    • 2006
  • This paper reports on a study investigating key attributes of service recovery strategies in internet shopping mall. In theses day, service recovery has received important attention in the service operation management literature. Service recovery involves those actions designed to resolve problems, alter negative attitudes of dissatisfied consumers and to ultimately retain these customers. The study examined that service recovery strategies(apology, value added, speed of recovery, empowerment) impact on the customer satisfaction and customer loyalty with SEM(Structural Equation Modeling). This study can be used a strategic implication for internet shopping mall managers to develop successful service recovery strategies.

  • PDF

Adaptive Selective Compressive Sensing based Signal Acquisition Oriented toward Strong Signal Noise Scene

  • Wen, Fangqing;Zhang, Gong;Ben, De
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3559-3571
    • /
    • 2015
  • This paper addresses the problem of signal acquisition with a sparse representation in a given orthonormal basis using fewer noisy measurements. The authors formulate the problem statement for randomly measuring with strong signal noise. The impact of white Gaussian signals noise on the recovery performance is analyzed to provide a theoretical basis for the reasonable design of the measurement matrix. With the idea that the measurement matrix can be adapted for noise suppression in the adaptive CS system, an adapted selective compressive sensing (ASCS) scheme is proposed whose measurement matrix can be updated according to the noise information fed back by the processing center. In terms of objective recovery quality, failure rate and mean-square error (MSE), a comparison is made with some nonadaptive methods and existing CS measurement approaches. Extensive numerical experiments show that the proposed scheme has better noise suppression performance and improves the support recovery of sparse signal. The proposed scheme should have a great potential and bright prospect of broadband signals such as biological signal measurement and radar signal detection.

Bioproduction of trans-10,cis-12-Conjugated Linoleic Acid by a Highly Soluble and Conveniently Extracted Linoleic Acid Isomerase and an Extracellularly Expressed Lipase from Recombinant Escherichia coli Strains

  • Huang, Mengnan;Lu, Xinyao;Zong, Hong;Zhuge, Bin;Shen, Wei
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.5
    • /
    • pp.739-747
    • /
    • 2018
  • The low solubility and high-cost recovery of Propionibacterium acnes polyunsaturated fatty acid isomerase (PAI) are key problems in the bioproduction of high value-added conjugated linoleic acid (CLA). To improve the solubility of recombinant PAI, six chaperone proteins were coexpressed with PAI. Introduction of GroELS proteins dramatically improved the PAI solubility from 29% to 97%, with increased activity by 57.8%. Combined expression of DnaKJ-GrpE and GroELS proteins increased the activity by 11.9%. In contrast, coexpression of DnaKJ-GrpE proteins significantly reduced the activity by 57.4%. Plasmids pTf16 harboring the tig gene and pG-Tf2 containing the tig and groEL-groES genes had no visible impact on PAI expression. The lytic protein E was then introduced into the recombinant Escherichia coli to develop a cell autolysis system. A 35% activity of total intracellular PAI was released from the cytoplasm by suspending the lysed cells in distilled water. The PAI recovery was further improved to 81% by optimizing the release conditions. The lipase from Rhizopus oryzae was also expressed in E. coli, with an extracellular activity of 110.9 U/ml. By using the free PAI and lipase as catalysts, a joint system was established for producing CLA from sunflower oil. Under the optimized conditions, the maximum titer of t-10,c-12-CLA reached 9.4 g/l. This work provides an effective and low-cost strategy to improve the solubility and recovery of the recombinant intracellular PAI for further large-scale production of CLA.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Recovering RSA Private Key Bits from Erasures and Errors (삭제와 오류로부터 RSA 개인키를 복구하는 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.951-959
    • /
    • 2017
  • Under the assumption that there is available some additional information other than plaintext-ciphertext pairs, the security of the RSA cryptosystem has been analyzed by the attack methods such as the side-channel attacks and the lattice-based attacks. Recently, based on the data retention property of the powered-off DRAMs, the so called cold boot attack was proposed in the literature, which is focusing on recovering the various cryptosystems' key from some auxiliary information. This paper is dealing with the problem of recovering the RSA private key with erasures and errors and proposes a new key recovery algorithm which is shown to have better performance than the previous one introduced by Kunihiro et al.

A Study on Multi_Kerberos Authentication Mechanism based on Certificate (인증서기반의 Multi_Kerberos 인증시스템에 관한 연구)

  • Shin, Kwang-Cheul;Cho, Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.57-66
    • /
    • 2006
  • In this paper. proposes Multi_Kerberos certification mechanism that improve certification service of based on PKINIT that made public in IETF CAT Working Group. This paper proposed to a certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, to get public key from DNS server by chain (CertPath) between realms by certification and key exchange way that provide service between realms applying X.509, DS/DNS of based on PKINIT, in order to provide regional services. This paper proposed mechanism that support efficient certification service about cross realm including key management. the path generation and construction of Certificate using Validation Server, and recovery of Session Key. A Design of Multi_Kerberos system that have effects simplify of certification formality that reduce procedures on communication.

  • PDF