• Title/Summary/Keyword: Point Signature

Search Result 77, Processing Time 0.023 seconds

A New Sampling Method of Marine Climatic Data for Infrared Signature Analysis (적외선 신호 해석을 위한 해양 기상 표본 추출법)

  • Kim, Yoonsik;Vaitekunas, David A.
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.51 no.3
    • /
    • pp.193-202
    • /
    • 2014
  • This paper presents a new method of sampling the climatic data for infrared signature analysis. Historical hourly data from a stationary marine buoy of KMA(Korean Meteorological Administration) are used to select a small number of sample points (N=100) to adequately cover the range of statistics(PDF, CDF) displayed by the original data set (S=56,670). The method uses a coarse bin to subdivide the variable space ($3^5$=243 bins) to make sample points cover the original data range, and a single-point ranking system to select individual points so that uniform coverage (1/N = 0.01) is obtained for each variable. The principal component analysis is used to calculate a joint probability of the coupled climatic variables. The selected sample data show good agreement to the original data set in statistical distribution and they will be used for statistical analysis of infrared signature and susceptibility of naval ships.

Centralized Educational Certificate Authentication System Using QR Cod Tag (QR코드를 이용한 통합 교육 자격 입증 시스템)

  • Abdurhman, Hamdi;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.271-274
    • /
    • 2017
  • An educational institution issued a degree certificate to those students who have successfully completed all studies included in different levels of the degree program. The degree certificate presented by the University is of major significance in the person's life but the fabrication and circulation of fake certificates is inexpensive because a paper document can easily be forged with the availability of advance printing and copying technologies. So, there is a need to adopt a centralized authentication process that can verify and ensure the authenticity of a document. In order to prevent the spread of fake degree certificates a method is proposed where the integrity of the contents with in the certificate can be verified with the use of and Smart Phone Application. A Quick Response (QR) Code will contain a digital signature over the data such as degree holder's name, major program, Grade Point Average (GPA) obtained etc. Which will be signed by university authorities after the registration in central system and deployed in university. In order to verify the digital signature a person need to use a specific smart phone application which will scan and authenticate the certificate without gaining access to a user's security credentials such as password.

  • PDF

Wavelet-based damage detection method for a beam-type structure carrying moving mass

  • Gokdag, Hakan
    • Structural Engineering and Mechanics
    • /
    • v.38 no.1
    • /
    • pp.81-97
    • /
    • 2011
  • In this research, the wavelet transform is used to analyze time response of a cracked beam carrying moving mass for damage detection. In this respect, a new damage detection method based on the combined use of continuous and discrete wavelet transforms is proposed. It is shown that this method is more capable in making damage signature evident than the traditional two approaches based on direct investigation of the wavelet coefficients of structural response. By the proposed method, it is concluded that strain data outperforms displacement data at the same point in revealing damage signature. In addition, influence of moving mass-induced terms such as gravitational, Coriolis, centrifuge forces, and pure inertia force along the deflection direction to damage detection is investigated on a sample case. From this analysis it is concluded that centrifuge force has the most influence on making both displacement and strain data damage-sensitive. The Coriolis effect is the second to improve the damage-sensitivity of data. However, its impact is considerably less than the former. The rest, on the other hand, are observed to be insufficient alone.

A High-Performance ECC Processor Supporting NIST P-521 Elliptic Curve (NIST P-521 타원곡선을 지원하는 고성능 ECC 프로세서)

  • Yang, Hyeon-Jun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.548-555
    • /
    • 2022
  • This paper describes the hardware implementation of elliptic curve cryptography (ECC) used as a core operation in elliptic curve digital signature algorithm (ECDSA). The ECC processor supports eight operation modes (four point operations, four modular operations) on the NIST P-521 curve. In order to minimize computation complexity required for point scalar multiplication (PSM), the radix-4 Booth encoding scheme and modified Jacobian coordinate system were adopted, which was based on the complexity analysis for five PSM algorithms and four different coordinate systems. Modular multiplication was implemented using a modified 3-Way Toom-Cook multiplication and a modified fast reduction algorithm. The ECC processor was implemented on xczu7ev FPGA device to verify hardware operation. Hardware resources of 101,921 LUTs, 18,357 flip-flops and 101 DSP blocks were used, and it was evaluated that about 370 PSM operations per second were achieved at a maximum operation clock frequency of 45 MHz.

Possibility of a second AGN in NGC 1068

  • Shin, Jaejin;Woo, Jong-Hak;Kim, Minjin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.1
    • /
    • pp.30.4-31
    • /
    • 2021
  • We will present a scenario of the presence of a second AGN in a nearby Seyfert galaxy, NGC 1068. Using VLT/MUSE IFU data, we investigated the complex kinematics of ionized gas in the central region of NGC 1068. Interestingly, at a distance of 180 pc to the northeast from the nucleus of NGC 1068, we detected a kinematical signature of the launching point of AGN gas outflows, which suggests that there would be a second AGN. We will also discuss another supporting evidence of the second AGN based on previous spectropolarimetric results.

  • PDF

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

A Design of Encryption System Using XML Signature in Mobile Environment (모바일 환경에서의 XML 전자서명을 이용한 암호화 시스템 설계)

  • Sung, Kyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.4
    • /
    • pp.61-66
    • /
    • 2004
  • Electronic commerce that use Mobile Phone according as the radio Internet develops rapidly and performance of Mobile Phone develops is activated. It is said that electronic commerce that use these Mobile Phone is M-Commerce. Also, the most important controversial point is data security or an user certification technology at these electronic commerce, there are research reactor WPKI and WTLS about this technology. However, when transmit message again after sign electronic documents in Mobile Phone, if do not encrypt, danger exists to be exposed to outside. Therefore, in this paper, designed system to encipher document that handle and handles user certification applying XML electronic sign technique in Mobile environment. Prevent of XML electronic sign in Mobile environment through this paper, and can stave off danger from outside by enciphering electronic sign document.

  • PDF

Identification of B52-dependent Gene Expression Signature and Alternative Splicing Using a D. melanogaster B52-null Mutant

  • Hong, Sun-Woo;Jung, Mi-Sun;Kim, Eun-Kyung;Lee, Dong-Ki;Kim, So-Youn
    • Bulletin of the Korean Chemical Society
    • /
    • v.30 no.2
    • /
    • pp.323-326
    • /
    • 2009
  • SR proteins are essential splicing regulators and also modulate alternative splicing events, which function both as redundant and substrate-specific manner. The Drosophila B52/SRp55, a member of the SR protein family, is essential for the fly development in vivo, as deletion of B52 gene results in lethality of animals at the second instar larval stage. Identification of the splicing target genes of B52 thus should be crucial for the understanding of the specific developmental role of B52 in vivo. In this study, we performed whole-genome DNA microarray experiments with a B52- knock-out animal. Analysis of the microarray data not only provided the B52-dependent gene expression signature, but also revealed a larval-stage specific, alternative splicing target gene of B52. Our result thus provides a starting point to understand the essential function of B52 at the organismal level.

Multi-Certification of Agent System Using XML (XML 전자서명을 이용한 다중인증 멀티 에이전트시스템)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence about an age of information demand is focused on a learner and remote education based on information technology WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submit various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. In this paper, we propose multi-Certification of agent system using XML digital signature to satisfy security requirement.

  • PDF

Self-Testing for FFT processor with systolic array architecture (시스토릭 어레이 구조를 갖는 FFT 프로세서에 대한 Self-Testing)

  • Lee, J.K.;Kang, B.H.;Choi, B.I.;Shin, K.U.;Lee, M.K.
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1503-1506
    • /
    • 1987
  • This paper proposes the self test method for 16 point FFT processor with systolic array architecture. To test efficiently and solve the increased hardware problems due to built-in self test, we change the normal registers into Linear Feedback Shift Registers(LFSR). LFSR can be served as a test pattern generator or a signature analyzer during self test operation, while LFSR a ordering register or a accumulator during normal operation. From the results of logic simulation for 16 point FFT processor by YSLOG, the total time is estimated in about. 21.4 [us].

  • PDF