• Title/Summary/Keyword: Key-update

Search Result 206, Processing Time 0.031 seconds

ELS FTF algorithm fot ARMA spectral estimation (ARMA스펙트럼 추정을 위한 ELS FTF 알고리즘)

  • 이철희;장영수;남현도;양홍석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.427-430
    • /
    • 1989
  • For on-line ARMA spectral estimation, the fast transversal filter algorithm of extended least squares method(ETS FTF) is presented. The projection operator, a key tool for geometric approach, is used in the derivation of the algorithm. ELS FTF is a fast time update recursion which is based on the fact that the correlation matrix of ARMA model satisfies the shift invariance property in each block, and thus it takes 10N+31 MADPR.

  • PDF

A Semantic-based Video Retrieval System using Method of Automatic Annotation Update and Multi-Partition Color Histogram (자동 주석 갱신 및 멀티 분할 색상 히스토그램 기법을 이용한 의미기반 비디오 검색 시스템)

  • 이광형;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1133-1141
    • /
    • 2004
  • In order to process video data effectively, it is required that the content information of video data is loaded in database and semantic-based retrieval method can be available for various query of users. In this paper, we propose semantic-based video retrieval system which support semantic retrieval of various users by feature-based retrieval and annotation-based retrieval of massive video data. By user's fundamental query and selection of image for key frame that extracted from query, the agent gives the detail shape for annotation of extracted key frame. Also, key frame selected by user become query image and searches the most similar key frame through feature based retrieval method that propose. From experiment, the designed and implemented system showed high precision ratio in performance assessment more than 90 percents.

Automated Method for the Efficient Management of DNSSEC Singing Keys in Korea (국내 DNSSEC 서명키의 효율적인 관리를 위한 자동화 방안)

  • Choi, Myung Hee;Kim, Seung Joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.8
    • /
    • pp.259-270
    • /
    • 2015
  • In this paper, we study and implement ways for users to easily apply and manage the DNSSEC in a domestic environment. DNSSEC is the DNS cache information proposed to address the vulnerability of modulation. However, DNSSEC is difficult to apply and manage due to insufficient domestic applications. In signing keys for efficient and reliable management of DNSSEC, we propose proactive monitoring SW and signing keys. This is an automatic management s/w signing key for DNSSEC efficient and reliable management and to provide a monitoring of the signing key. In addition to the proposed details of how DNSSEC signing key update and monitoring progress smoothly, we expect that the present study will help domestic users to apply and manage DNSSEC easily.

An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks

  • Kim, Jin Myoung;Lee, Hae Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2518-2533
    • /
    • 2020
  • In wireless sensor networks, adversaries may physically capture sensor nodes on the fields, and use them to launch false positive attacks (FPAs). FPAs could be conducted by injecting forged or old sensing reports, which would represent non-existent events on the fields, with the goal of disorientating the base stations and/or reducing the limited energy resources of sensor nodes on the fields. Researchers have proposed various mitigation methods against FPAs, including the statistical en-route filtering scheme (SEF). Most of these methods are based on key pre-distribution schemes and can efficiently filter injected false reports out at relay nodes through the verification of in-transit reports using the pre-distributed keys. However, their filtering power may decrease as time goes by since adversaries would attempt to capture additional nodes as many as possible. In this paper, we propose an adaptive key distribution method that could maintain the security power of SEF in WSNs under such circumstances. The proposed method makes, if necessary, BS update or re-distribute keys, which are used to endorse and verify reports, with the consideration of the filtering power and energy efficiency. Our experimental results show that the proposed method is more effective, compared to SEF, against FPAs in terms of security level and energy saving.

Dynamic mechanism of rock mass sliding and identification of key blocks in multi-fracture rock mass

  • Jinhai Zhao;Qi Liu;Changbao Jiang;Zhang Shupeng;Zhu Weilong;Ma Hailong
    • Geomechanics and Engineering
    • /
    • v.32 no.4
    • /
    • pp.375-385
    • /
    • 2023
  • There are many joint fissures distributed in the engineering rock mass. In the process of geological history, the underground rock mass undergoes strong geological processes, and undergoes complex geological processes such as fracture breeding, expansion, recementation, and re-expansion. In this paper, the damage-stick-slip process (DSSP), an analysis model used for rock mass failure slip, was established to examine the master control and time-dependent mechanical properties of the new and primary fractures of a multi-fractured rock mass under the action of stress loading. The experimental system for the recemented multi-fractured rock mass was developed to validate the above theory. First, a rock mass failure test was conducted. Then, the failure stress state was kept constant, and the fractured rock mass was grouted and cemented. A secondary loading was applied until the grouted mass reached the intended strength to investigate the bearing capacity of the recemented multi-fractured rock mass, and an acoustic emission (AE) system was used to monitor AE events and the update of damage energy. The results show that the initial fracture angle and direction had a significant effect on the re-failure process of the cement rock mass; Compared with the monitoring results of the acoustic emission (AE) measurements, the master control surface, key blocks and other control factors in the multi-fractured rock mass were obtained; The triangular shaped block in rock mass plays an important role in the stress and displacement change of multi-fracture rock mass and the long fissure and the fractures with close fracture tip are easier to activate, and the position where the longer fractures intersect with the smaller fractures is easier to generate new fractures. The results are of great significance to a multi-block structure, which affects the safety of underground coal mining.

Implications of telomerase reverse transcriptase in tumor metastasis

  • Zou, Yongkang;Cong, Yu-sheng;Zhou, Junzhi
    • BMB Reports
    • /
    • v.53 no.9
    • /
    • pp.458-465
    • /
    • 2020
  • Metastasis is the main culprit of the great majority of cancerrelated deaths. However, the complicated process of the invasion-metastasis cascade remains the least understood aspect of cancer biology. Telomerase plays a pivotal role in bypassing cellular senescence and sustaining the cancer progression by maintaining telomere homeostasis and genomic integrity. Telomerase reverse transcriptase (TERT) exerts a series of fundamental functions that are independent of its enzymatic cellular activity, including proliferation, inflammation, epithelia-mesenchymal transition (EMT), angiogenesis, DNA repair, and gene expression. Accumulating evidence indicates that TERT may facilitate most steps of the invasion-metastasis cascade. In this review, we summarize important advances that have revealed some of the mechanisms by which TERT facilitates tumor metastasis, providing an update on the non-canonical functions of telomerase beyond telomere maintaining.

WHO Treatment Guidelines for Drug-Resistant Tuberculosis, 2016 Update: Applicability in South Korea

  • Jeon, Doosoo
    • Tuberculosis and Respiratory Diseases
    • /
    • v.80 no.4
    • /
    • pp.336-343
    • /
    • 2017
  • Despite progress made in tuberculosis control worldwide, the disease burden and treatment outcome of multidrug-resistant tuberculosis (MDR-TB) patients have remained virtually unchanged. In 2016, the World Health Organization released new guidelines for the management of MDR-TB. The guidelines are intended to improve detection rate and treatment outcome for MDR-TB through novel, rapid molecular testing and shorter treatment regimens. Key changes include the introduction of a new, shorter MDR-TB treatment regimen, a new classification of medicines and updated recommendations for the conventional MDR-TB regimen. This paper will review these key changes and discuss the potential issues with regard to the implementation of these guidelines in South Korea.

A GroupKey Distribution Mechanism using Efficient Key Update Message in Mobile Network Environments. (모바일 네트워크 환경에서 효율적인 키 갱신메시지 전달을 이용한 그룹키 분배 기법)

  • Ahn, Byeonguk;Kim, Kangseok;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.900-902
    • /
    • 2011
  • 모바일 기기와 무선통신의 발달로 모바일 기기를 대상으로 하는 다양한 종류의 멀티캐스트 네트워크 기반 멀티미디어 서비스가 증가하고 있다. 이러한 멀티캐스트 통신 환경에서 보안성을 제공하기 위해 사용되는 그룹키를 전달하고 관리하는 것이 중요한 문제가 되고 있다. 또한 연구도 꾸준히 진행 되고 있으며, 본 논문은 기존연구(LKH)를 바탕으로 상대적으로 대역폭이 적은 모바일 환경에서 키-인덱스를 이용하여 키를 갱신하고 동기화하는 메시지의 양을 줄이는 방법을 제시한다.

The Biometric Authentication based Dynamic Group Signature Scheme (바이오메트릭 인증 기반의 동적 그룹 서명 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.49-55
    • /
    • 2016
  • In a delegate authentication, a user can lend his/her own authentication data to the third parties to let them be authenticated instead of himself/herself. The user authentication schemes based on the memory of unique data such as password, are vulnerable to this type of attack. Biometric authentication could minimize the risk of delegate authentication since it uses the biometric data unique by each person. Group authentication scheme is used to prove that each group member belongs to the corresponding group. For applications such as an electronic voting or a mobile meeting where the number of group members is changing dynamically, a new group authentication method is needed to reflect the status of group in real time. In this paper, we propose biometric authentication based dynamic group signature scheme. The proposed scheme is composed of biometric key generation, group public key creation, group signature generation, group signature verification and member update protocols. The proposed member update protocol is secure against colluding attacks of existing members and could reflect group status in real time.

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network (유비쿼터스 센서네트워크에서 에너지효율을 고려하는 비동기적인 키관리 기법)

  • Yoon, Mi-Youn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.1011-1022
    • /
    • 2006
  • WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.