• Title/Summary/Keyword: KeyPoint Selection

Search Result 59, Processing Time 0.03 seconds

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

A Parameter Selection Method for Multi-Element Resonant Converters with a Resonant Zero Point

  • Wang, Yifeng;Yang, Liang;Li, Guodong;Tu, Shijie
    • Journal of Power Electronics
    • /
    • v.18 no.2
    • /
    • pp.332-342
    • /
    • 2018
  • This paper proposes a parameter design method for multi-element resonant converters (MERCs) with a unique resonant zero point (RZP). This method is mainly composed of four steps. These steps include program filtration, loss comparison, 3D figure fine-tuning and priority compromise. It features easy implementation, effectiveness and universal applicability for almost all of the existing RZP-MERCs. Meanwhile, other design methods are always exclusive for a specific topology. In addition, a novel dual-CTL converter is also proposed here. It belongs to the RZP-MERC family and is designed in detail to explain the process of parameter selection. The performance of the proposed method is verified experimentally on a 500W prototype. The obtained results indicate that with the selected parameters, an extensive dc voltage gain is obtained. It also possesses over-current protection and minimal switching loss. The designed converter achieves high efficiencies among wide load ranges, and the peak efficiency reaches 96.9%.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

Research on Per-cell Codebook based Channel Quantization for CoMP Transmission

  • Hu, Zhirui;Feng, Chunyan;Zhang, Tiankui;Gao, Qiubin;Sun, Shaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1828-1847
    • /
    • 2014
  • Coordinated multi-point (CoMP) transmission has been regarded as a potential technology for LTE-Advanced. In frequency division duplexing systems, channel quantization is applied for reporting channel state information (CSI). Considering the dynamic number of cooperation base stations (BSs), asymmetry feature of CoMP channels and high searching complexity, simply increasing the size of the codebook used in traditional multiple antenna systems to quantize the global CSI of CoMP systems directly is infeasible. Per-cell codebook based channel quantization to quantize local CSI for each BS separately is an effective method. In this paper, the theoretical upper bounds of system throughput are derived for two codeword selection schemes, independent codeword selection (ICS) and joint codeword selection (JCS), respectively. The feedback overhead and selection complexity of these two schemes are analyzed. In the simulation, the system throughput of ICS and JCS is compared. Both analysis and simulation results show that JCS has a better tradeoff between system throughput and feedback overhead. The ICS has obvious advantage in complexity, but it needs additional phase information (PI) feedback for obtaining the approximate system throughput with JCS. Under the same number of feedback bits constraint, allocating the number of bits for channel direction information (CDI) and PI quantization can increase the system throughput, but ICS is still inferior to JCS. Based on theoretical analysis and simulation results, some recommendations are given with regard to the application of each scheme respectively.

An effective Supplier Selection Model for e-Business & ISO 9001 System (e-Business 환경 하에서 ISO 9001 품질경영시스템의 효율적인 공급자 선정모델)

  • 이무성;이영해
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.4
    • /
    • pp.15-25
    • /
    • 2002
  • This paper considers supplier selection process for e-business & ISO 9001 quality management system environments. Determining suitable suppliers in the electronic commerce has become a key strategic consideration. However, the nature of these decisions is usually complex and unstructured. In this paper, a Quality Estimated Supplier Selection (QESS) model is proposed to deal with the supplier selection problems in the e-business(Business to Business: B to B). In the supplier selection, quality management factors will be considered for the first time, and then price, and delivery etc. In the first level, we deal with the quality management factors such as quality management audit, product test, engineering man-power, capability index and training time etc., based on the five point scale. In the second level, a QESS model determines the final solution by considering factors such as price, production lead-time and delivery time.

Forecasting the Baltic Dry Index Using Bayesian Variable Selection (베이지안 변수선택 기법을 이용한 발틱건화물운임지수(BDI) 예측)

  • Xiang-Yu Han;Young Min Kim
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.21-37
    • /
    • 2022
  • Baltic Dry Index (BDI) is difficult to forecast because of the high volatility and complexity. To improve the BDI forecasting ability, this study apply Bayesian variable selection method with a large number of predictors. Our estimation results based on the BDI and all predictors from January 2000 to September 2021 indicate that the out-of-sample prediction ability of the ADL model with the variable selection is superior to that of the AR model in terms of point and density forecasting. We also find that critical predictors for the BDI change over forecasts horizon. The lagged BDI are being selected as an key predictor at all forecasts horizon, but commodity price, the clarksea index, and interest rates have additional information to predict BDI at mid-term horizon. This implies that time variations of predictors should be considered to predict the BDI.

Enhancement of electrical characteristics and reliability of CuGeS2/GeS2-based super-linear-threshold-switching device by insertion of TiN liner

  • Hea-Jee Kim;Hyo-Jun Kwon;Dong-Hyun Park;Jea-Gun Park
    • Journal of the Korean Physical Society
    • /
    • v.80
    • /
    • pp.1076-1080
    • /
    • 2022
  • For preventing a sneak current in the 3D cross-point array, the selection device is essentially necessary and an n-MOSFET has been used for the selection device. However, the three-terminal electrodes of n-MOSFET make to achieve a high density of a cross-point array difficult. As a solution, using a selector having two terminal electrodes has been intensively researched. We presented that the CuGeS2/GeS2-based super-linear-threshold-switching (SLTS) selector device with the insertion of optimal TiN liner thickness exhibited outstanding electrical characteristics and reliability. The dependency of electrical characteristics and reliability on various TiN liner thicknesses were investigated. In addition, the principles of reliability and electrical characteristics improvement were understood through the energy dispersive spectroscopy elemental mapping and line profile of Cu. The adequate amount of Cu distributed in GeS2 resistive switching layer is a key factor to achieve excellent electrical characteristics and reliability for an ultra-high-density 3D cross-point array cell.

Block-Level Resource Allocation with Limited Feedback in Multicell Cellular Networks

  • Yu, Jian;Yin, Changchuan
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.420-428
    • /
    • 2016
  • In this paper, we investigate the scheduling and power allocation for coordinated multi-point transmission in downlink long term evolution advanced (LTE-A) systems, where orthogonal frequency division multiple-access is used. The proposed scheme jointly optimizes user selection, power allocation, and modulation and coding scheme (MCS) selection to maximize the weighted sum throughput with fairness consideration. Considering practical constraints in LTE-A systems, the MCSs for the resource blocks assigned to the same user need to be the same. Since the optimization problem is a combinatorial and non-convex one with high complexity, a low-complexity algorithm is proposed by separating the user selection and power allocation into two subproblems. To further simplify the optimization problem for power allocation, the instantaneous signal-to-interference-plus-noise ratio (SINR) and the average SINR are adopted to allocate power in a single cell and multiple coordinated cells, respectively. Simulation results show that the proposed scheme can improve the average system throughput and the cell-edge user throughput significantly compared with the existing schemes with limited feedback.

Efficient and Precise Construction of Markerless Manipulations in the Bacillus subtilis Genome

  • Yu, Haojie;Yan, Xin;Shen, Weiliang;Shen, Yujia;Zhang, Ji;Li, Shunpeng
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.45-53
    • /
    • 2010
  • We have developed an efficient and precise method for genome manipulations in Bacillus subtilis that allows rapid alteration of a gene sequence or multiple gene sequences without altering the chromosome in any other way. In our approach, the Escherichia coli toxin gene mazF, which was used as a counter-selectable marker, was placed under the control of a xylose-inducible expression system and associated with an antibiotic resistance gene to create a "mazF-cassette". A polymerase chain reaction (PCR)-generated fragment, consisting of two homology regions joined to the mazF-cassette, was integrated into the chromosome at the target locus by homologous recombination, using positive selection for antibiotic resistance. Then, the excision of the mazF-cassette from the chromosome by a single-crossover event between two short directly repeated (DR) sequences, included in the design of the PCR products, was achieved by counter-selection of mazF. We used this method efficiently and precisely to deliver a point mutation, to inactivate a specific gene, to delete a large genomic region, and to generate the in-frame deletion with minimal polar effects in the same background.

Fast key-frame extraction for 3D reconstruction from a handheld video

  • Choi, Jongho;Kwon, Soonchul;Son, Kwangchul;Yoo, Jisang
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.1-9
    • /
    • 2016
  • In order to reconstruct a 3D model in video sequences, to select key frames that are easy to estimate a geometric model is essential. This paper proposes a method to easily extract informative frames from a handheld video. The method combines selection criteria based on appropriate-baseline determination between frames, frame jumping for fast searching in the video, geometric robust information criterion (GRIC) scores for the frame-to-frame homography and fundamental matrix, and blurry-frame removal. Through experiments with videos taken in indoor space, the proposed method shows creating a more robust 3D point cloud than existing methods, even in the presence of motion blur and degenerate motions.