• Title/Summary/Keyword: Updating Scheme

Search Result 149, Processing Time 0.026 seconds

Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption

  • Kwon, Seok-Chul;Lee, In-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.280-285
    • /
    • 2015
  • Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security, where a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, updated key data are obtained by using previous image data and the first phase mask used in encryption. The SLM with the updated key is used as the second phase mask for encryption. We provide a detailed description of the method of encryption and decryption for a DRPE system using the proposed key updating scheme, and simulation results are also shown to verify that the proposed key updating scheme can enhance the security of the original DRPE.

TF-CPABE: An efficient and secure data communication with policy updating in wireless body area networks

  • Chandrasekaran, Balaji;Balakrishnan, Ramadoss;Nogami, Yasuyuki
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.465-472
    • /
    • 2019
  • The major challenge in wireless body area networks (WBAN) is setting up a protected communication between data consumers and a body area network controller while meeting the security and privacy requirements. This paper proposes efficient and secure data communication in WBANs using a Twofish symmetric algorithm and ciphertext-policy attribute-based encryption with constant size ciphertext; in addition, the proposed scheme incorporates policy updating to update access policies. To the best of the author's knowledge, policy updating in WBAN has not been studied in earlier works. The proposed scheme is evaluated in terms of message size, energy consumption, and computation cost, and the results are compared with those of existing schemes. The result shows that the proposed method can achieve higher efficiency than conventional methods.

CMAC Neuro-Fuzzy Design for Color Calibration (컬러재현을 위한 CMAC의 뉴로퍼지 설계)

  • 이철희;변오성;문성룡;임기영
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.05a
    • /
    • pp.97-100
    • /
    • 2001
  • CMAC model was proposed by Albus [6] to formulate the processing characteristics of the human cerebellum. Instead of the global weight updating scheme used in the back propagation, CMAC use the local weight updating scheme. Therefore, CMAC have the advantage of fast learning and high convergence rate. In this paper, simulate Color Calibration by CMAC in color images and design hardware by VHDL-base high-level synthesis.

  • PDF

Subscriber Grouping for Multi-Layered Location Registration Scheme in Microcellular PCS

  • Lee, Chae Y.;Kim, Seok J.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.3
    • /
    • pp.61-75
    • /
    • 1995
  • In a microcellular personal communication service (PCS) it is required to minimize the paging and location updating signals. We propose a multi-layered location registration scheme to reduce the paging and updating signals. In this scheme the subscribers are grouped by their characteristics (velocity and call arrival rate) and are served by appropriately sized location registration area. In order to group the subscriber, we define subscriber grouping problem (SGP). Proposition are examined to solve the grouping problem. The performance of the proposed subscriber grouping algorithm is tested with examples. Simulation results indicate that the subscriber grouping procedure is effective for designing the multi-layered location registration scheme.

  • PDF

Finite element model updating of Canton Tower using regularization technique

  • Truong, Thanh Chung;Cho, Soojin;Yun, Chung Bang;Sohn, Hoon
    • Smart Structures and Systems
    • /
    • v.10 no.4_5
    • /
    • pp.459-470
    • /
    • 2012
  • This paper summarizes a study for the modal analysis and model updating conducted using the monitoring data obtained from the Canton Tower of 610 m tall, which was established as an international benchmark problem by the Hong Kong Polytechnic University. Modal properties of the tower were successfully identified using frequency domain decomposition and stochastic subspace identification methods. Finite element model updating using the measurement data was further performed to reduce the modal property differences between the measurements and those of the finite element model. Over-fitting during the model updating was avoided by using an optimization scheme with a regularization term.

A Comparison between EFIU and HEIU Schemes in ADI-FDTD Simulations (ADI-FDTD 해석에서의 EFIU와 HFIU 계산 방법 비교 연구)

  • Ju Sae-Hoon;Lee Kyung-Hoon;Hwang In-Ho;Kim Hyeong-Dong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.1 s.104
    • /
    • pp.8-16
    • /
    • 2006
  • In this paper, updating schemes for the alternating-direction implicit finite-difference time-domain method(ADI-FDTD) are studied, which method has the potential to considerably reduce the number of time iterations especially in case where the fine spatial lattice relative to the wavelength is used to resolve fine geometrical features. In numerical simulations for microwave structure using ADI-FDTD, time marching scheme comprises of two sub-iterations. Two different updating equation sets for ADI-FDTD simulations are presented. In order to discuss the characteristics of those schemes especially in view of applying boundary conditions, we solved two complementary 2-D problems.

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage

  • Qi, Yining;Tang, Xin;Huang, Yongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2429-2449
    • /
    • 2018
  • Dynamic data possession verification is a common requirement in cloud storage systems. After the client outsources its data to the cloud, it needs to not only check the integrity of its data but also verify whether the update is executed correctly. Previous researches have proposed various schemes based on Merkle Hash Tree (MHT) and implemented some initial improvements to prevent the tree imbalance. This paper tries to take one step further: Is there still any problems remained for optimization? In this paper, we study how to raise the efficiency of data dynamics by improving the parts of query and rebalancing, using a new data structure called Rank-Based Merkle AVL Tree (RB-MAT). Furthermore, we fill the gap of verifying multiple update operations at the same time, which is the novel batch updating scheme. The experimental results show that our efficient scheme has better efficiency than those of existing methods.

CMAC Neuro-Fuzzy Design for Color Calibration (컬러재현을 위한 CMAC의 뉴로퍼지 설계)

  • 이철희;변오성;문성룡;임기영
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.331-335
    • /
    • 2001
  • Cl\iAC model was proposed by Albus [6J to formulate the processing characteristics of the human cerebellum. Instead of the global weight updating scheme used in the back propagation, CMAC use the local weight updating scheme. Therefore, CMAC have the advantage of fast learning and high convergence rate. In this paper, simulate Color Calibration by CMAC in color images and design hardware by VHDL-base high-level synthesis.

  • PDF

Flexible Protocol Reconfiguration for Emergency Communication Systems

  • Zhang, Ji;Li, Hai;Hou, Shujuan
    • ETRI Journal
    • /
    • v.33 no.1
    • /
    • pp.18-26
    • /
    • 2011
  • The necessity for services of emergency communication systems to be uninterrupted and reliable has brought forward strict requirements for express software upgrades of base stations. Based on reconfigurability technology, this paper presents a protocol reconfiguration scheme for emergency communication base stations. By introducing the concept of 'local safe state,' the proposed scheme could make the updating and replacement of the protocol software flexible and maintain interactions during the updating procedure to achieve seamless system upgrades. Further, taking TETRA protocol stack and VxWorks operating system as an example, specific processes and realization methods of reconfiguration are proposed in this paper, along with the measurements of the factors impacting on the system performance. Simulation results show that, compared with traditional technology, the method proposed significantly improves the system efficiency and does not interrupt system services.

Nondestructive Evaluation of Railway Bridge by System Identification Using Field Vibration Measurement

  • Ho, Duc-Duy;Hong, Dong-Soo;Kim, Jeong-Tae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.6
    • /
    • pp.527-538
    • /
    • 2010
  • This paper presents a nondestructive evaluation approach for system identification (SID) of real railway bridges using field vibration test results. First, a multi-phase SID scheme designed on the basis of eigenvalue sensitivity concept is presented. Next, the proposed multi-phase approach is evaluated from field vibration tests on a real railway bridge (Wondongcheon bridge) located in Yangsan, Korea. On the steel girder bridge, a few natural frequencies and mode shapes are experimentally measured under the ambient vibration condition. The corresponding modal parameters are numerically calculated from a three-dimensional finite element (FE) model established for the target bridge. Eigenvalue sensitivities are analyzed for potential model-updating parameters of the FE model. Then, structural subsystems are identified phase-by-phase using the proposed model-updating procedure. Based on model-updating results, a baseline model and a nondestructive evaluation of test bridge are identified.