• Title/Summary/Keyword: balanced incomplete block design

Search Result 50, Processing Time 0.023 seconds

Conference Key Agrement Protocol for Multilateral Remote Conference Employing a SBIBD Network (SBIBD 네트워크에서 다자간 원격회의를 위한 회의용 키 생성 프로토콜)

  • Kim, Seong-Yeol;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.4
    • /
    • pp.265-269
    • /
    • 2009
  • A conference key agreement system is a scheme to generate a session key in a contributory manner in order to communicate with each other securely among participants. In this paper an efficient conference key agreement system is proposed by employing symmetric balanced incomplete block design(SBIBD), one class of block designs. The protocol presented not only minimizes the message overhead and message exchanging rounds but also makes every participant contribute evenly for generating a conference key. Our protocol constructs a conference key which takes modified Diffe-Helman form of ${\prod}_{i=0}^{v-1}R_i$, where v is the number of participants and $R_i$ is a random number generated from member i. In a special class of SBIBD, it takes only 3 rounds message exchange and message overhead is $O(v{\sqrt{v}})$. Our protocol can be proved as computationally difficult to calculate as discrete logarithms.

  • PDF

Balanced Experimental Designs for cDNA Microarray data

  • Choi, Kuey-Chung
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2006.04a
    • /
    • pp.121-129
    • /
    • 2006
  • Two color or cDNA microarrays are extensively used to study relative expression levels of thousands of genes simultaneously. 0かy two tissue samples can be hybridized on a single microarray slide. Thus, a microarray slide necessarily forms an incomplete block design with block size two when more than two tissue samples are under study. We also need to control for variability in gene expression values due to the two dyes. Thus, red and green dyes form the second blocking factor in addition to slides. General design problem for these microarray experiments is discussed in this paper. Designs for factorial cDNA microarrays are also discussed.

  • PDF

An Implementation on the XOR-ACC of Multimedia Fingerprinting using Neural Network (신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.1-8
    • /
    • 2011
  • In multimedia fingerprinting field, it is many used a code based on BIBD, which has a strong resiliency of anti-collusion. When a collusion-attack code is generated with a logical XOR operation using the code based on BIBD, then some cases are occurred that a colluded code could be generated to the same fingerprint of non-colluder on the other hand, the colluder is decided to the non-colluder so that he would be excepted in the colluder tracing. For solving the serious problem of the wrong decision of the colluder tracing in this paper, XOR-ACC is implemented using multi-layer perceptron neural network among (AND, OR, XOR and Averaging)-ACC by the measured correlation coefficient. Through the experiment, it confirms that XOR-ACC efficiency of multimedia fingerprinting code{7,3,1} based on BIBD is improved to 88.24% from the conventional 41.18%, so that a ratio of the colluder tracing is also improved to 100% from the conventional 53%. As a result, it could be traced and decided completely a sectional colluder and non-colluder about the collusion attacks.

USN Channel Establishment Algorithm for Sensor Authentication and Anti-collision (센서 인증과 충돌 방지를 위한 USN 채널 확립 알고리즘)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.74-80
    • /
    • 2007
  • Advances in electronic and computer technologies have paved the way for the proliferation of WSN(wireless sensor networks). Accordingly, necessity of anti-collusion and authentication technology is increasing on the sensor network system. Some of the algorithm developed for the anti-collision sensor network can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like: simple parallel distributed computation, distributed storage, data robustness and auto-classification of sensor readings. To achieve security in wireless sensor networks, it is important to be able to establish safely channel among sensor nodes. In this paper, we proposed the USN(Ubiquitous Sensor Network) channel establishment algorithm for sensor's authentication and anti-collision. Two different data aggregation architectures will be presented, with algorithms which use wavelet filter to establish channels among sensor nodes and BIBD (Balanced Incomplete Block Design) which use anti-collision methods of the sensors. As a result, the proposed algorithm based on BIBD and wavelet filter was made for 98% collision detection rate on the ideal environment.

Assessment of Bioequivalence with Dropout Subjects in 3$\times$3 and 3$\times$2 Crossover Design

  • Ko, seoung-gon;Oh, Hyun-Sook
    • Journal of the Korean Statistical Society
    • /
    • v.29 no.2
    • /
    • pp.219-229
    • /
    • 2000
  • Oh et al.(1999) 3$\times$2 crossover design for assessing bioequivalence when two new generic drug formulations and innovator are simultaneously considered. This design is not only more efficient than 3$\times$3 one, proposed by Lee et al.(1998), in practical sense, but also more ethical in medical sense. However, the general statistical methods are not directly applicable to both designs when subjects are dropped out in the experiment, even though it is always possible in bioavailability and bioequivalence studies because of some administrative and economic reasons. In this research we propose an inference to drug effects when subjects are dropped out in the planed-for 3$\times$3 and 3$\times$2 crossover experiments. An example is given for illustration.

  • PDF

Analysis of Consumer Preferences for Cosmetic Essence-for-Men via Choice-Based Conjoint with New Design of Choice Sets

  • Kim, Bu-Yong;Kim, Jiyoung;Kan, Yu-Yeong
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.6
    • /
    • pp.987-997
    • /
    • 2012
  • The sales volume of men's cosmetics has drastically increased in Korea. In recent years, men's needs for cosmetics have been diversified and the consumer demand for functional cosmetics has greatly risen. In particular, male consumers have become more interested in essence product that is a light and concentrated treatment to correct skin problems. This research analyzes consumer preferences for essence-for-men through the use of choice-based conjoint analysis. This approach is adopted since the task of respondents to choose the most preferred option from several alternatives closely mimics actual marketplace purchasing behavior by consumers. New technique for the construction of choice sets is suggested based on the balanced incomplete block design, to accommodate a larger number of product profiles. The proposed design for choice sets is balanced and provides a tool to filter the contradictory choices. Conjoint analyses are performed to assess the relative importance of attributes and identify the most preferred profile of essence-for-men with respect to attributes such as emphasized function, price, type of content, and design of container. Some differences are indicated in the analysis results between age brackets as well as between groups classified by the amount of fashion item expenditures.

Robustness of Complete Diallel cross designs with a Single Missing Observation

  • Kwon, Yong-Man;Lee, Jang-Jae
    • Journal of Integrative Natural Science
    • /
    • v.5 no.2
    • /
    • pp.135-138
    • /
    • 2012
  • The reduction of efficiency of missing observations on complete diallel cross designs are examined. we studies robustness of optimal block designs for estimating general combining ability against loss of missing observations in diallel cross. A-efficiencies suggest that these designs are fairly robust. Simple g-inverses may be found for the information matrices of the line effects which allow evaluation of expressions for the variances of the differences between the pairs of line effects with missing observations. we numerically calculate the reduction of efficiency for estimating general combining ability against loss of missing observations in diallel cross.

MODIFIED SECOND ORDER SLOPE ROTATABLE DESIGNS USING BIBD

  • Victorbabu B. Re.
    • Journal of the Korean Statistical Society
    • /
    • v.35 no.2
    • /
    • pp.179-192
    • /
    • 2006
  • In this paper, a new method of modified second order slope rotatable designs (SOSRD) using balanced incomplete block designs (BIBD) for $4{\le}v{\le}16$ is presented. In this method the number of design points required is in some cases less than the number required in Victorbabu (2305) modified slope rotatable central composite designs. Further, a new method of construction of three level modified SOSRD using BIBD is presented. The modified SOSRD can be viewed as SOSRD constructed with the technique of augmentation of second order rotatable design (SORD) using BIBD to SOSRD. These designs are useful in parts to estimate responses and slopes with spherical variance functions.

A Design on the Multimedia Fingerprinting code based on Feature Point for Forensic Marking (포렌식 마킹을 위한 특징점 기반의 동적 멀티미디어 핑거프린팅 코드 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.27-34
    • /
    • 2011
  • In this paper, it was presented a design on the dynamic multimedia fingerprinting code for anti-collusion code(ACC) in the protection of multimedia content. Multimedia fingerprinting code for the conventional ACC, is designed with a mathematical method to increase k to k+1 by transform from BIBD's an incidence matrix to a complement matrix. A codevector of the complement matrix is allowanced fingerprinting code to a user' authority and embedded into a content. In the proposed algorithm, the feature points were drawing from a content which user bought, with based on these to design the dynamical multimedia fingerprinting code. The candidate codes of ACC which satisfied BIBD's v and k+1 condition is registered in the codebook, and then a matrix is generated(Below that it calls "Rhee matrix") with ${\lambda}+1$ condition. In the experimental results, the codevector of Rhee matrix based on a feature point of the content is generated to exist k in the confidence interval at the significance level ($1-{\alpha}$). Euclidean distances between row and row and column and column each other of Rhee matrix is working out same k value as like the compliment matrices based on BIBD and Graph. Moreover, first row and column of Rhee matrix are an initial firing vector and to be a forensic mark of content protection. Because of the connection of the rest codevectors is reported in the codebook, when trace a colluded code, it isn't necessity to solve a correlation coefficient between original fingerprinting code and the colluded code but only search the codebook then a trace of the colluder is easy. Thus, the generated Rhee matrix in this paper has an excellent robustness and fidelity more than the mathematically generated matrix based on BIBD as ACC.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.