• Title/Summary/Keyword: id phase

Search Result 100, Processing Time 0.021 seconds

Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards' ('스마트카드를 이용한 생체인식기반 사용자 인증스킴의 분석 및 개선'의 내용 오류와 안전성 분석)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.99-106
    • /
    • 2014
  • In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An's authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user's random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user's the biometric information is revealed in lost smart card. Since An's authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An's authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.

Improvements of a Dynamic ID-Based Remote User Authentication Scheme (동적 ID 기반 원격 사용자 인증 스킴의 보안성 개선)

  • Young-Do, Joo;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.303-310
    • /
    • 2011
  • Recently, many user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication process. In 2009, Wang et al. proposed a more effective and secure dynamic ID-based remote user authentication scheme to improve the security weakness of Das et al.'s scheme, and asserted that the improved scheme is secure against independent of password in authentication phase and provides mutual authentication between the user and the remote server. However, in this paper, we analyze the security of Wang et al. scheme and demonstrate that Wang et al.'s scheme is vulnerable to the man-in-the-middle attack and the off-line password guessing attack. In addition, we show that Wang et al. scheme also fails to provide mutual authentication. Accordingly, we propose an improved scheme to overcome these security weakness even if the secrete information stored in the smart card is revealed. Our proposed scheme can withstand the user impersonation attack, the server masquerading attack and off-line password guessing attack. Furthermore, this improved scheme provides the mutual authentication and is more effective than Wang et al.'s scheme in term of the computational complexities.

New Technologies in Low Pollution Swine Diets : Diet Manipulation and Use of Synthetic Amino Acids, Phytase and Phase Feeding for Reduction of Nitrogen and Phosphorus Excretion and Ammonia Emission - Review -

  • Lenis, Nico P.;Jongbloed, Age W.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.12 no.2
    • /
    • pp.305-327
    • /
    • 1999
  • In the paper insight is given in the legislation policy to restrain environmental pollution by pig husbandry, focused on The Netherlands (Mineral Accounting System). Besides, nutritional measures are presented to reduce environmental pollution by lowering excretion of N and P, emphasizing (multi) phase feeding, the use of low protein, synthetic amino acids supplemented diets, phytase and its effect on phosphorus and calcium digestibility, its interaction with phytic acid and proteins, and the environmental impact of the use of phytase in pig diets. Also, nutritional means are indicated to reduce ammonia volatilization from pig operations. It is concluded that nutrition management can substantially contribute to reduction of N and P excretion by pigs, mainly by lowering dietary protein levels, (multi) phase feeding and the use of microbial phytase, and that the use of phytase on a large scale in The Netherlands has a tremendous environmental impact. In 20 years the excretion of P in growing-finishing pigs has more than halved. Ammonia emission from manure of pigs can be reduced substantially by lowering dietary protein content, but also by including additional non-starch polysaccharides in the diet. A very promising method to reduce ammonia emission is to manipulate dietary cation-anion difference, e.g. by adding acidifying salts to the diet, which will lower pH of urine substantially. Further research is desirable. This also applies to determining dietary factors influencing the odour release from manure. Finally, some speculation on the future of pig farming from an environmental viewpoint is presented.

Defending Against Some Active Attacks in P2P Overlay Networks (P2P 오버레이 네트워크에서의 능동적 공격에 대한 방어)

  • Park Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.451-457
    • /
    • 2006
  • A peer-to-peer(P2P) network is inherently vulnerable to malicious attacks from participating peers because of its open, flat, and autonomous nature. This paper addresses the problem of effectively defending from active attacks of malicious peers at bootstrapping phase and at online phase, respectively. We propose a secure membership handling protocol to protect the assignment of ID related things to a newly joining peer with the aid of a trusted entity in the network. The trusted entities are only consulted when new peers are joining and are otherwise uninvolved in the actions of the P2P networks. For the attacks in online phase, we present a novel message structure applied to each message transmitted on the P2P overlay. It facilitates the detection of message alteration, replay attack and a message with wrong information. Taken together, the proposed techniques deter malicious peers from cheating and encourage good peers to obey the protocol of the network. The techniques assume a basic P2P overlay network model, which is generic enough to encompass a large class of well-known P2P networks, either unstructured or not.

Single-Phase Impedance-Source Dynamic Voltage Restorer (단상 임피던스-소스 동적 전압 보상기)

  • Park, H.J.;Jung, Y.G.;Lim, Y.C.
    • Proceedings of the KIPE Conference
    • /
    • 2008.06a
    • /
    • pp.458-461
    • /
    • 2008
  • This paper deals with a single-phase impedance-source dynamic voltage restorer (Impedance-DVR) to mitigate voltage sag/swell for the critical loads. The proposed system is composed of passive filter and impedance-source topology inverter. As an ESS(Energy Storage System) of the proposed system is employed the Proton Exchange Membrane Fuel Cells (PEMFC). To calculate and control the compensation voltage, single-phase $^id-^iq$ theory in dq rotating reference frame and PI controller are used. Simulation results under voltage sag and swell are presented to show the performance.

  • PDF

Analytic Techniques for Change Detection using Landsat (Landast 영상을 이용한 변화탐지 분석 기법 연구)

  • Choi, Chul-Uong;Lee, Chang-Hun;Suh, Yong-Cheol;Kim, Ji-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.3
    • /
    • pp.13-20
    • /
    • 2009
  • Techniques for change detection using satellite images enable efficient detection of natural and artificial changes in use of land through multi-phase images. As for change detection, different results are made based on methods of calibration of satellite images, types of input data, and techniques in change analysis. Thus, an analytic technique that is appropriate to objectives of a study shall be applied as results are different based on diverse conditions even when an identical satellite and an identical image are used for change detection. In this study, Normalized Difference Vegetation Index (NDVI) and Principal Component Analysis (PCA) were conducted after geometric calibration of satellite images which went through absolute and relative radiometric calibrations and change detection analysis was conducted using Image Difference (ID) and Image Rationing (IR). As a result, ID-NDVI showed excellent accuracy in change detection related to vegetation. ID-PCA showed 90% of accuracy in all areas. IR-NDVI had 90% of accuracy while it was 70% and below as for paddies and dry fields${\rightarrow}$grassland. IR-PCA had excellent change detection over all areas.

  • PDF

Subjective and Objective Assessment of Monoenergetic and Polyenergetic Images Acquired by Dual-Energy CT in Breast Cancer

  • Xiaoxia Wang;Daihong Liu;Shixi Jiang;Xiangfei Zeng;Lan Li;Tao Yu;Jiuquan Zhang
    • Korean Journal of Radiology
    • /
    • v.22 no.4
    • /
    • pp.502-512
    • /
    • 2021
  • Objective: To objectively and subjectively assess and compare the characteristics of monoenergetic images [MEI (+)] and polyenergetic images (PEI) acquired by dual-energy CT (DECT) of patients with breast cancer. Materials and Methods: This retrospective study evaluated the images and data of 42 patients with breast cancer who had undergone dual-phase contrast-enhanced DECT from June to September 2019. One standard PEI, five MEI (+) in 10-kiloelectron volt (keV) intervals (range, 40-80 keV), iodine density (ID) maps, iodine overlay images, and Z effective (Zeff) maps were reconstructed. The contrast-to-noise ratio (CNR) and the signal-to-noise ratio (SNR) were calculated. Multiple quantitative parameters of the malignant breast lesions were compared between the arterial and the venous phase images. Two readers independently assessed lesion conspicuity and performed a morphology analysis. Results: Low keV MEI (+) at 40-50 keV showed increased CNR and SNRbreast lesion compared with PEI, especially in the venous phase ([CNR: 40 keV, 20.10; 50 keV, 14.45; vs. PEI, 7.27; p < 0.001], [SNRbreast lesion: 40 keV, 21.01; 50 keV, 16.28; vs. PEI, 10.77; p < 0.001]). Multiple quantitative DECT parameters of malignant breast lesions were higher in the venous phase images than in the arterial phase images (p < 0.001). MEI (+) at 40 keV, ID, and Zeff reconstructions yielded the highest Likert scores for lesion conspicuity. The conspicuity of the mass margin and the visual enhancement were significantly better in 40-keV MEI (+) than in the PEI (p = 0.022, p = 0.033, respectively). Conclusion: Compared with PEI, MEI (+) reconstructions at low keV in the venous phase acquired by DECT improved the objective and subjective assessment of lesion conspicuity in patients with malignant breast lesions. MEI (+) reconstruction acquired by DECT may be helpful for the preoperative evaluation of breast cancer.

Feasibility Study of Remote Field Eddy Current Testing for Nonmagnetic Steam Generator Tubes (비자성 증기발생기 전열관의 원격장와전류 탐상 가능성 연구)

  • Shin, Young-Kil
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.21 no.5
    • /
    • pp.518-525
    • /
    • 2001
  • As steam generator (SG) tubes have aged, new and subtle flaws have appeared. Most of them start growing from outside the tubes. Since signals from outer diameter (OD) defects are very weak compared to those from inner diameter (ID) defects in the conventional eddy current testing due to skin effect, this paper studies the feasibility of using remote field eddy current (RFEC) technique, which has shown equal sensitivity to ID and OD defects in the ferromagnetic pipe inspection. Finite element modeling studies show that the operating frequency needs to be increased up to a few hundred kHz in order for RFEC effects to occur in the nonmagnetic SG tube. The proper distance between exciter and sensor coils is also found to be about 1.5 OD, which is half the distance used in the ferromagnetic pipe inspection. Defect signals obtained by the designed RFEC probe show equal sensitivity to ID and OD defects and the existence of linear relationship between defect depth and phase signal strength. These results tell us that RFEC inspection is feasible even in nonmagnetic steam generator tubes.

  • PDF

Isolation and Characterization of Thermophilic Bacillus licheniformis YJ09 from Spent Mushroom (Pleurotus ostreatus) Substrates (느타리 수확후배지로부터 분리된 고온성 Bacillus licheniformis YJ09의 특성)

  • Kim, Hye Soo;Kim, Chul Hwan;Cho, Soo Jeong
    • Journal of Mushroom
    • /
    • v.14 no.4
    • /
    • pp.244-248
    • /
    • 2016
  • In order to isolate thermophilic bacteria with high activity of CMCase and xylanase, spent mushroom substrates was collected from an oyster mushroom cultivation farm in Jinju, Gyeongnam, Korea. Among the isolates, one strain designated as YJ09 was selected by agar diffusion method. The isolate YJ09 was identified as a member of Bacillus licheniformis based on biochemical characteristics using Bacillus ID kit and MicroLog system. Comparative 16S rDNA sequence analysis showed that isolate YJ09 formed a distinct phylogenetic tree within the genus Bacillus and was most closely related to Bacillus licheniformis with sequence similarity of 98.9%. Based on its physiological properties, biochemical characteristics and phylogenetic distinctiveness, the isolate YJ09 was classified as Bacillus licheniformis. The CMCase and xylanase activity of B. licheniformis YJ09 was slightly increased corresponding to the bacterial population from exponential phase to stationary phase in the growth curve of B. licheniformis YJ09.

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.