• Title/Summary/Keyword: exposure algorithm

Search Result 218, Processing Time 0.026 seconds

The Secure Algorithm on the Sensitive data using Bloom filter and bucket method (버킷과 블룸필터를 혼합한 민감한 데이터 보안)

  • Yu, Choun-Young;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.939-946
    • /
    • 2012
  • Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.

Application of Dual Tree Complex Wavelet for Performance Improvement of CT Images (CT 영상의 화질개선을 위한 이중트리복합웨이블릿의 적용)

  • Choi, Seokyoon
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.7
    • /
    • pp.941-946
    • /
    • 2019
  • Computed tomography (CT) has been increasing in frequency and indications for use in clinical diagnosis and treatment decisions. Multidetector CT has the advantage of shortening the inspection time and obtaining a high resolution image compared to a single detector CT, but has been pointed out the disadvantage of increasing the radiation exposure. In addition, when the low tube voltage is used to reduce the exposure dose in the CT, noise increases relatively. In the existing method, the method of finding the optimal image quality using the method of adjusting the parameters of the image reconstruction method is not a fundamental measure. In this study, we applied a double-tree complex wavelet algorithm and analyzed the results to maintain the normal signal and remove only noise. Experimental results show that the noise is reduced from 8.53 to 4.51 when using a complex oriented 2D method with 100kVp and 0.5sec rotation time. Through this study, it was possible to remove the noise and reduce the patient dose by using the optimal noise reduction algorithm. The results of this study can be used to reduce the exposure of patients due to the low dose of CT.

Prediction of Exposure to 1763MHz Radiofrequency Radiation Using Support Vector Machine Algorithm in Jurkat Cell Model System

  • Huang Tai-Qin;Lee Min-Su;Bae Young-Joo;Park Hyun-Seok;Park Woong-Yang;Seo Jeong-Sun
    • Genomics & Informatics
    • /
    • v.4 no.2
    • /
    • pp.71-76
    • /
    • 2006
  • We have investigated biological responses to radiofrequency (RF) radiation in in vitro and in vivo models. By measuring the levels of heat shock proteins as well as the activation of mitogen activated protein kinases (MAPKs), we could not detect any differences upon RF exposure. In this study, we used more sensitive method to find the molecular responses to RF radiation. Jurkat, human T-Iymphocyte cells were exposed to 1763 MHz RF radiation at an average specific absorption rate (SAR) of 10 W/kg for one hour and harvested immediately (R0) or after five hours (R5). From the profiles of 30,000 genes, we selected 68 differentially expressed genes among sham (S), R0 and R5 groups using a random-variance F-test. Especially 45 annotated genes were related to metabolism, apoptosis or transcription regulation. Based on support vector machine (SVM) algorithm, we designed prediction model using 68 genes to discriminate three groups. Our prediction model could predict the target class of 19 among 20 examples exactly (95% accuracy). From these data, we could select the 68 biomarkers to predict the RF radiation exposure with high accuracy, which might need to be validated in in vivo models.

Study on the methods of risk assessment of human exposure by using of PVC flooring (PVC 바닥재 인체 노출에 따른 위해성 평가 연구)

  • Kim, Woo Il;Cho, Yoon A;Kim, Min Sun;Lee, Ji Youmg;Kang, Young Yeul;Shin, Sun Kyoung;Jeong, Seong Kyoung;Yeon, Jin Mo
    • Analytical Science and Technology
    • /
    • v.27 no.5
    • /
    • pp.261-268
    • /
    • 2014
  • In advanced countries, a variety of consumer exposure assessment models including CONSEXPO, are developed to manage risks of consumer products containing hazardous materials. The models are used to assess the risks of exposure to hazardous chemicals in consumer products, which serves as a foundation for regulation standards. In this study, exposure assessment models applicable for various scenarios were reviewed and a proper model was applied for the selected products and risk assessment was conducted at each stage to establish a risk assessment procedure for different types of products. Based on the exposure scenario, exposure factor was selected and according to the algorithm produced based on CONSEXPO exposure model, some level of phthalates were detected from some types of PVC flooring. However, a correlation between phthalate content and migration rate showed r-square 0.0065, little correlation, which is inadequate for estimating standard value. For this reason, it seems valid that the current standard be in place. Additionally, any new standard was not suggested as VOCs were not found harmful to human health, allowing the existing standard to be continuously applied. No migration rate was found for heavy metals and risk assessment was not performed accordingly. In this aspect, it is presumed that hazards to health through dermal exposure would be very little.

Design of a TL Personal Dosimeter Identifiable PA Exposure and Development of Its Dose Evaluation Algorithm (후방피폭선량계측이 가능한 TL 개인선량계의 설계 및 선량평가 알고리즘 개발)

  • Kwon, J.W.;Kim, H.K.;Yang, J.S.;Kim, J.L.;Lee, J.K.
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.3
    • /
    • pp.179-186
    • /
    • 2004
  • A single-dosimeter worn on the anterior surface of body of a worker was found to provide significant underestimation of dose to the worker when radiation comes from behind of the human body. Recently, several researchers suggested that this kind of underestimation can be corrected to a certain extent by using an extra dosimeter on the back. But this multiple dosimetry also has the disadvantages like overestimation lowering work efficiency or cost burden. In this study, a single dosimeter introducing asymmetric filters enabled to identify PA exposure was designed by monte-carlo simulation and experiments and its dose evaluation algorithm for AP-PA mixed radiation field was established. This algorithm was applicable to penetrating radiation which had the effective energy more than 100 keV. Besides, the dosimeter and algorithm in this study were possible to be applied to near PA exposure.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

A design of ABC(Advanced Block Cipher) Algorithm (ABC(Advanced Block Cipher) 알고리즘 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yun, Dong-Sic
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.64-69
    • /
    • 2010
  • This paper designs the ABC(Advanced Block Cipher) algorithm which is a 64byte block encryption algorithm, improves the performance of encryption process time, and makes an key exchange using EC-DH. The ABC algorithm reduces basic memory occupation rates using the original data position exchange method which is a data swap key without S-Box, IP-Box and etc. Also, it prepares the exposure of symmetric key using the unfixed encryption(decryption) key excepting the fixed encryption(decryption) key. Therefore, the proposed ABC algorithm in this paper is a proper encryption algorithm in lower memory environment and mobile banking.

  • PDF

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

Image Enhancement Algorithm in Imaging Systems for Electronic Photography (전자사진용 화상시스템의 화상개선 알고리즘)

  • 박용주;김지홍
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.20 no.1
    • /
    • pp.133-145
    • /
    • 2002
  • A study on electronic imaging system with silver halide photography emulation by a parametric approach will be introduced. The study contains the comparison analysis between silver halide imaging process and electronic imaging process, the characterization of the detailed process in those imaging chains, such as exposure, developing, photographic print and the other photographic and digital process. We investigated the characteristic curve between optical density and the amount of exposure in silver halide and digital photography systems. Under wide range of exposure condition, several sensitometric parameters were obtained via studio and outdoor photographic experiments with conventional photography and a digital camera. whose experimental results will be shown. Finally, the comparison between electronic imaging and conventional photography via silver halide photography emulation and modeling the silver halide process wi13 be discussed.

  • PDF

Correlation Analysis of Radon Levels using Cluster Algorithm

  • Oh, Myeong Hwan;Jung, Yong Gyu;Kang, Min Soo;Lee, John
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.93-98
    • /
    • 2015
  • Recently, Radon has been gotten attention for problems of Nuclear Generating Station and a variety of nuclear. It is naturally arises that is accumulated in the interior through the soil with radioactive materials. People exposed to indoor a Radon increase the high risks of lung cancer. The data are consisted of regional Country, The Location, Average Radon pCi/L, Geo Mean and Geo S.D etc. The research is experimented using E-M algorithm. The research result appears to make a division of soil distance, regional and cluster. It requires in effort to minimize exposure to people who live in areas with high radon levels. A country must apprise to people about Radon risk and needs to work out measures plan.