• Title/Summary/Keyword: hiding technique

Search Result 128, Processing Time 0.034 seconds

Is Hiding Foot and Mouth Disease Sensitive Behavior for Farmers? A Survey Study in Sri Lanka

  • Gunarathne, Anoma;Kubota, Satoko;Kumarawadu, Pradeep;Karunagoda, Kamal;Kono, Hiroichi
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.29 no.2
    • /
    • pp.280-287
    • /
    • 2016
  • Foot and mouth disease (FMD) has a long history in Sri Lanka and was found to be endemic in various parts of the country and constitutes a constant threat to farmers. In Sri Lanka, currently there is no regular, nationwide vaccination programme devised to control FMD. Therefore, improving farmers' knowledge regarding distinguishing FMD from other diseases and ensuring prompt reporting of any suspicion of FMD as well as restricting movement of animals are critical activities for an effective FMD response effort. Therefore, the main purpose of this study was to clarify the relationship between farmers' knowledge levels and their behaviors to establish a strategy to control FMD. In our study, item count technique was applied to estimate the number of farmers that under-report and sell FMD-infected animals, although to do so is prohibited by law. The following findings were observed: about 63% of farmers have very poor knowledge of routes of FMD transmission; 'under-reporting' was found to be a sensitive behavior and nearly 23% of the farmers were reluctant to report FMD-infected animals; and 'selling FMD-infected animals' is a sensitive behavior among high-level knowledge group while it is a non-sensitive behavior among the low-level knowledge group. If farmers would understand the importance of prompt reporting, they may report any suspected cases of FMD to veterinary officials. However, even if farmers report honestly, they do not want to cull FMD-infected animals. Thus, education programs should be conducted not only on FMD introduction and transmission, but also its impact. Furthermore, consumers may criticize the farmers for culling their infected animals. Hence, not only farmers, but also consumers need to be educated on the economic impact of FMD and the importance of controlling an outbreak. If farmers have a high knowledge of FMD transmission, they consider selling FMD-infected animals as a sensitive behavior. Therefore, severe punishment should be levied for selling FMD-infected animals.

A Novel Cooperative Warp and Thread Block Scheduling Technique for Improving the GPGPU Resource Utilization (GPGPU 자원 활용 개선을 위한 블록 지연시간 기반 워프 스케줄링 기법)

  • Thuan, Do Cong;Choi, Yong;Kim, Jong Myon;Kim, Cheol Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.219-230
    • /
    • 2017
  • General-Purpose Graphics Processing Units (GPGPUs) build massively parallel architecture and apply multithreading technology to explore parallelism. By using programming models like CUDA, and OpenCL, GPGPUs are becoming the best in exploiting plentiful thread-level parallelism caused by parallel applications. Unfortunately, modern GPGPU cannot efficiently utilize its available hardware resources for numerous general-purpose applications. One of the primary reasons is the inefficiency of existing warp/thread block schedulers in hiding long latency instructions, resulting in lost opportunity to improve the performance. This paper studies the effects of hardware thread scheduling policy on GPGPU performance. We propose a novel warp scheduling policy that can alleviate the drawbacks of the traditional round-robin policy. The proposed warp scheduler first classifies the warps of a thread block into two groups, warps with long latency and warps with short latency and then schedules the warps with long latency before the warps with short latency. Furthermore, to support the proposed warp scheduler, we also propose a supplemental technique that can dynamically reduce the number of streaming multiprocessors to which will be assigned thread blocks when encountering a high contention degree at the memory and interconnection network. Based on our experiments on a 15-streaming multiprocessor GPGPU platform, the proposed warp scheduling policy provides an average IPC improvement of 7.5% over the baseline round-robin warp scheduling policy. This paper also shows that the GPGPU performance can be improved by approximately 8.9% on average when the two proposed techniques are combined.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

Characterization of Noerog, A Traditional Green Mineral Pigment (전통 녹색 석채로 사용된 "뇌록"의 특성연구)

  • Do, Jin-Young;Lee, Sang-Jin;Kim, Soo-Jin;Yun, Yun-Kyung;Ahn, Byung-Chan
    • Journal of the Mineralogical Society of Korea
    • /
    • v.21 no.3
    • /
    • pp.271-281
    • /
    • 2008
  • The "Noerog", a traditional green mineral pigment occurs as veins or cavity-filings in the basaltic pyroclastic rocks of Quaternary Epoch in Mt. Noeseong in Janggi-myeon, Pohang. The "Noerog stone" mainly consists of celadonite with minor chlorite/smectite, mordenite and opal. Celadonite grains are several hundreds to several tens of ${\mu}m$ in size. The particle sizes under several tens of fm are likely to coagulate to aggregates. The coloring rate increases rapidly with decreasing particle size under $71{\mu}m$. The hiding power is maximum in the particle sizes of $0.2\sim0.3{\mu}m$. The resistance properties of the Noerog to both the light and the bacteria are absolutely superior to ordinary chemical pigments. The transparency of the Noerog is maximum in the nano-powders under 200 nm. Examination of the color of the Noerog pigment which has been prepared by traditional technique for "dancheong" shows that the best coloring effect is found in the particle sizes under $32{\mu}m$ and that the painting was not successful for the Noerog of particle size over $32{\mu}m$.

A Study on the Bai Juyi Jungeun-sasang(中隱思想) and The Garden Construction (백거이의 중은사상과 원림조영)

  • Lee, Won-Ho;Ahn, Hye-In;Shin, Hyun-Sil;Ha, Tae-Il;Kim, So-Hyeon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.33 no.1
    • /
    • pp.119-128
    • /
    • 2015
  • The purpose of this study was to look at the Jungeun-sasang(中隱思想) and garden of Bai Juyi in the perspective of landscape architecture and inquiry the meaning of Bai Juyi's construction activities, thought shown in his gardens, and how his construction method influenced later and the result is as follows. First, the 'Jungeun-sasang(中隱思想)' of Bai Juyi improved the Eunil-sasang(隱逸思想) and the birth of 'Jungeun-sasang(中隱思想)' became a clue to be developed up to the garden art. In addition, different from before that built gardens hiding in mountains, it prepared the turning point to build gardens in cities. Second, the space principle of 'paradise' shown in the garden of Bai Juyi was a means and principle to absorb the nature such as positioning rocks, formation of mounds, and positioning of flowers in the limited and small spaces different from previous gardens of splendid and magnificent. The garden became not only outer scene but also the 'Simwon(心園) that reflected the inside world. 12) Third, the gardening act and thought appeared in the poem of Bai Juyi were expressed in pictures and his own gardens as his poem was borrowed and quoted. As a result, Bai Juyi's literary view on the art and thought prepared the base in the popularity of literary gardens and forming of characteristic styles through practical activities that he managed his own gardens. Forth, Bai Juyi's level of Confucianism realization and delicate aesthetical consciousness gave meanings to the scene of gardens through the discovery of the fusion of mountains and creeks, ways of adding, and the aesthetical consciousness of Taihushi(太湖石)and influenced in the forming of garden culture later on.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers (화이트 박스 블록 암호에 대한 최신 암호분석 기술 동향 연구)

  • Chaerin Oh;Woosang Im;Hyunil Kim;Changho Seo
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.9-18
    • /
    • 2023
  • Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making challenging verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures. adhering to the format of a research paper.