• Title/Summary/Keyword: key division method

Search Result 366, Processing Time 0.025 seconds

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

A Comparative Performance Analysis of Segmentation Models for Lumbar Key-points Extraction (요추 특징점 추출을 위한 영역 분할 모델의 성능 비교 분석)

  • Seunghee Yoo;Minho Choi ;Jun-Su Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.5
    • /
    • pp.354-361
    • /
    • 2023
  • Most of spinal diseases are diagnosed based on the subjective judgment of a specialist, so numerous studies have been conducted to find objectivity by automating the diagnosis process using deep learning. In this paper, we propose a method that combines segmentation and feature extraction, which are frequently used techniques for diagnosing spinal diseases. Four models, U-Net, U-Net++, DeepLabv3+, and M-Net were trained and compared using 1000 X-ray images, and key-points were derived using Douglas-Peucker algorithms. For evaluation, Dice Similarity Coefficient(DSC), Intersection over Union(IoU), precision, recall, and area under precision-recall curve evaluation metrics were used and U-Net++ showed the best performance in all metrics with an average DSC of 0.9724. For the average Euclidean distance between estimated key-points and ground truth, U-Net was the best, followed by U-Net++. However the difference in average distance was about 0.1 pixels, which is not significant. The results suggest that it is possible to extract key-points based on segmentation and that it can be used to accurately diagnose various spinal diseases, including spondylolisthesis, with consistent criteria.

Invariant Biometric Key Extraction based on Iris Code (홍채 코드 기반 생체 고유키 추출에 관한 연구)

  • Lee, Youn-Joo;Lee, Hyung-Gu;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1011-1014
    • /
    • 2005
  • In this paper, we propose a method that extracts an invariant biometric key in order to apply this biometric key to the crypto-biometric system. This system is a new authentication architecture which can improve the security of current cryptographic system and solve the problem of stored template protection in conventional biometric system, also. To use biometric information as a cryptographic key in crypto-biometric system, same key should be generated from the same person. However, it is difficult to obtain such an invariant biometric key because biometric data is sensitive to surrounding environments. The proposed method solves this problem by clustering Iris Codes obtained by using independent component analysis (ICA).

  • PDF

Magnetic Interaction in FeCo Alloy Nanotube Array

  • Zhou, D.;Wang, T.;Zhu, M.G.;Guo, Z.H.;Li, W.;Li, F.S.
    • Journal of Magnetics
    • /
    • v.16 no.4
    • /
    • pp.413-416
    • /
    • 2011
  • An array of FeCo nanotubes has been successfully fabricated in the pores of porous anodic aluminum oxide (AAO) templates by wetting templates method. The morphology and structure of the nanotube array were characterized by scanning electron microscopy, transmission electron microscopy and x-ray diffraction. The average diameter of the nanotubes was about 200 nm, and the length was more than 10 ${\mu}m$. Vibrating sample magnetometer and superconducting quantum interference device were used to investigate the magnetic properties of the nanotube array. Interaction between the nanotubes has been found to be demagnetizing as expected and the switching field distribution is broad.

Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption

  • Kwon, Seok-Chul;Lee, In-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.280-285
    • /
    • 2015
  • Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security, where a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, updated key data are obtained by using previous image data and the first phase mask used in encryption. The SLM with the updated key is used as the second phase mask for encryption. We provide a detailed description of the method of encryption and decryption for a DRPE system using the proposed key updating scheme, and simulation results are also shown to verify that the proposed key updating scheme can enhance the security of the original DRPE.

Process of the Encryption key using a Physical Information in the U-Healthcare Service (원격의료서비스에서 생체정보를 이용한 암호화키 생성방법 연구)

  • Song, Chung-Geon;Lee, Keun-Ho;Ryu, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.573-578
    • /
    • 2014
  • Recently as we enter into the world of an aging society, the U-Healthcare service is newly spotlighted. In order to secure this U-Healthcare, a development of security solution that is suitable for the U-Healthcare environment is required. But the U-Healthcare environment is difficult to apply the existing security solution with the lack of standards, a security solution with high completeness was not developed. At this point, in order to structure the safe U-Healthcare environment, a generating method of an encryption key using the body information that helps the effective key management and ensuring the confidentiality of the data is proposed.

Parallelization and application of SACOS for whole core thermal-hydraulic analysis

  • Gui, Minyang;Tian, Wenxi;Wu, Di;Chen, Ronghua;Wang, Mingjun;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.12
    • /
    • pp.3902-3909
    • /
    • 2021
  • SACOS series of subchannel analysis codes have been developed by XJTU-NuTheL for many years and are being used for the thermal-hydraulic safety analysis of various reactor cores. To achieve fine whole core pin-level analysis, the input preprocessing and parallel capabilities of the code have been developed in this study. Preprocessing is suitable for modeling rectangular and hexagonal assemblies with less error-prone input; parallelization is established based on the domain decomposition method with the hybrid of MPI and OpenMP. For domain decomposition, a more flexible method has been proposed which can determine the appropriate task division of the core domain according to the number of processors of the server. By performing the calculation time evaluation for the several PWR assembly problems, the code parallelization has been successfully verified with different number of processors. Subsequent analysis results for rectangular- and hexagonal-assembly core imply that the code can be used to model and perform pin-level core safety analysis with acceptable computational efficiency.

Developing User Persona Based on the Factors of Visitor Recreation Activities in Hongneung Experimental Forest

  • Jang, Youn-Sun;Yoo, Rhee-Hwa;Lee, Jeong-Hee
    • Journal of People, Plants, and Environment
    • /
    • v.22 no.5
    • /
    • pp.525-539
    • /
    • 2019
  • Much research has been conducted on user behavior by taking surveys and interviews to plan the green space effectively. However, there is a limitation in understanding detailed user characteristics such as personalities and values. This study applied the Persona-based Scenario Method (PSM) to Hongneung Experimental Forest to understand the detailed needs and behaviors of the users in the forest recreation area. The PSM is a user experience modeling technique, which tries to understand the users by describing the type of users as real people. This study 1) extracts the factors of visitor recreation activities in Hongneung Experimental Forest based on the results of the survey, 2) develops user personas based on the results of survey and comes up with activity factors, and 3) designs user scenarios. As a result of applying the PSM, 64 factors of visitor activities were derived from the observation survey in 14 sites of Hongneung Experimental Forest and 25 key factors of visitor activities were chosen through observer's brainstorming. Second, three types of personas were developed considering the key factors and the results of user characteristics with quantitative and qualitative analysis. Lastly, context scenarios were designed by applying the key factors of visitor recreation activities to the persona model. We identified the design problems of the space and design requirements through the scenarios. This study has significance in that it takes an approach from the user perspective and was applied to the forest recreation area, which was mainly used in product design. The developed personas could be used for deriving design elements and setting the direction for planning considering detailed needs, behaviors and characteristics of users.

Resource Allocation in Multi-User MIMO-OFDM Systems with Double-objective Optimization

  • Chen, Yuqing;Li, Xiaoyan;Sun, Xixia;Su, Pan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2063-2081
    • /
    • 2018
  • A resource allocation algorithm is proposed in this paper to simultaneously minimize the total system power consumption and maximize the system throughput for the downlink of multi-user multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems. With the Lagrange dual decomposition method, we transform the original problem to its convex dual problem and prove that the duality gap between the two problems is zero, which means the optimal solution of the original problem can be obtained by solving its dual problem. Then, we use convex optimization method to solve the dual problem and utilize bisection method to obtain the optimal dual variable. The numerical results show that the proposed algorithm is superior to traditional single-objective optimization method in both the system throughput and the system energy consumption.

A systematic revision of the genus Gonia Meigen (Diptera: Tachinidae) in Korea

  • Lee, Hyun-Suk;Han, Ho-Yeon
    • Animal cells and systems
    • /
    • v.14 no.3
    • /
    • pp.175-195
    • /
    • 2010
  • The genus Gonia (Diptera: Tachinidae) is revised for the Korean species. We recognize four previously known species (G. chinensis, G. divisa, G. foersteri, and G. klapperichi), three newly recorded species in Korea (G. distinguenda, G. olgae, and G. ussuriensis) and a species new to science (G. nigricoma Lee and Han, sp. nov.). We here provide a key, descriptions, photographs and illustrations. We also inferred the phylogenetic relationships of the representative Palaearctic species using cladistic method.