• Title/Summary/Keyword: standardization algorithm

Search Result 122, Processing Time 0.023 seconds

A Study on Iterative MAP-Based Turbo Code over CDMA Channels (CDMA 채널 환경에서의 MAP 기반 터보 부호에 관한 연구)

  • 박노진;강철호
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.13-16
    • /
    • 2000
  • In the recent mobile communication systems, the performance of Turbo Code using the error correction coding depends on the interleaver influencing the free distance determination and the recursive decoding algorithms that is executed in the turbo decoder. However, performance depends on the interleaver depth that need great many delay over the reception process. Moreover, Turbo Code has been known as the robust coding methods with the confidence over the fading channel. The International Telecommunication Union(ITU) has recently adopted as the standardization of the channel coding over the third generation mobile communications the same as IMT-2000. Therefore, in this paper, we proposed of that has the better performance than existing Turbo Decoder that has the parallel concatenated four-step structure using MAP algorithm. In the real-time voice and video service over the third generation mobile communications, the performance of the proposed method was analyzed by the reduced decoding delay using the variable decoding method by computer simulation over AWGN and lading channels.

  • PDF

A Study on the Development of PMM Algorithms for a Product Development Innovation (제품 개발 혁신을 위한 PPM 알고리즘에 관한 연구)

  • Lee, Jae-Myung;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1750-1759
    • /
    • 2009
  • Recently from the enterprise when about reduction the product of numerous type to develop does not produce simultaneously with Life Cycle shortening and JIT productions of the product, is confronting in the environment which will not become. In order to confront in like this environment, developing the good product importance but, the product researches what kind of direction and developing with core subject of technical innovation is recognized. For the development method and an investment direction of the product proposed PPM (Product Portfolio Management) algorithms from the research which sees from like this viewpoint. With PPM algorithms which are proposed, divided the product in 6 kind groups of standardization type, discrimination type, material cost investigation type, processing cost investigation type and sale promotion type and abolition type and presented tyresearch and development direction..Research approach portfolio investigation of existing research and consulting experience of research and development field with background, presented the analytical model of algorithm, is applied of the instance which composed.

XOB: An XMDR-based Ontology Builder (XOB: XMDR 기반의 온톨로지 생성 시스템)

  • Lee, Suk-Hoon;Jeong, Dong-Won;Kim, Jang-Won;Baik, Doo-Kwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.904-917
    • /
    • 2010
  • Much research on ontology has been done during the last decade in order to represent knowledge and connect data semantically in AI and Semantic Web areas. However, ontologies might be represented and defined in different ways depending on knowledge and intention of users. It causes heterogeneity problem that the same concept can be differently expressed. This paper introduces a XOB (XMDR-based Ontology Builder) system based on XMDR to resolve the problem. XOB creates ontologies by reusing classes and relations defined in XMDR. XOB therefore is able to either solve or minimize the heterogeneity problem among ontologies. This paper introduces the conceptual model and overall architecture of the proposed system XOB. This paper defines the process, algorithm, ontology generation rule that is required to create ontologies by using concepts registered in XMDR. Our proposal supports higher standardization than the previous approaches, and it provides many advantages such as consistent concept usage, easy semantic exchange, and so on. Therefore, XOB enables high-quality ontology creation and reduces cost for ontology integration and system development.

An Effective Control Method for Improving Integrity of Mobile Phone Forensics (모바일 포렌식의 무결성 보장을 위한 효과적인 통제방법)

  • Kim, Dong-Guk;Jang, Seong-Yong;Lee, Won-Young;Kim, Yong-Ho;Park, Chang-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.151-166
    • /
    • 2009
  • To prove the integrity of digital evidence on the investigation procedure, the data which is using the MD 5(Message Digest 5) hash-function algorithm has to be discarded, if the integrity was damaged on the investigation. Even though a proof restoration of the deleted area is essential for securing the proof regarding a main phase of a case, it was difficult to secure the decisive evidence because of the damaged evidence data due to the difference between the overall hash value and the first value. From this viewpoint, this paper proposes the novel model for the mobile forensic procedure, named as "E-Finder(Evidence Finder)", to ,solve the existing problem. The E-Finder has 5 main phases and 15 procedures. We compared E-Finder with NIST(National Institute of Standards and Technology) and Tata Elxsi Security Group. This paper thus achieved the development and standardization of the investigation methodology for the mobile forensics.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Personalized Size Recommender System for Online Apparel Shopping: A Collaborative Filtering Approach

  • Dongwon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.39-48
    • /
    • 2023
  • This study was conducted to provide a solution to the problem of sizing errors occurring in online purchases due to discrepancies and non-standardization in clothing sizes. This paper discusses an implementation approach for a machine learning-based recommender system capable of providing personalized sizes to online consumers. We trained multiple validated collaborative filtering algorithms including Non-Negative Matrix Factorization (NMF), Singular Value Decomposition (SVD), k-Nearest Neighbors (KNN), and Co-Clustering using purchasing data derived from online commerce and compared their performance. As a result of the study, we were able to confirm that the NMF algorithm showed superior performance compared to other algorithms. Despite the characteristic of purchase data that includes multiple buyers using the same account, the proposed model demonstrated sufficient accuracy. The findings of this study are expected to contribute to reducing the return rate due to sizing errors and improving the customer experience on e-commerce platforms.

Fractal dimension analysis as an easy computational approach to improve breast cancer histopathological diagnosis

  • Lucas Glaucio da Silva;Waleska Rayanne Sizinia da Silva Monteiro;Tiago Medeiros de Aguiar Moreira;Maria Aparecida Esteves Rabelo;Emílio Augusto Campos Pereira de Assis;Gustavo Torres de Souza
    • Applied Microscopy
    • /
    • v.51
    • /
    • pp.6.1-6.9
    • /
    • 2021
  • Histopathology is a well-established standard diagnosis employed for the majority of malignancies, including breast cancer. Nevertheless, despite training and standardization, it is considered operator-dependent and errors are still a concern. Fractal dimension analysis is a computational image processing technique that allows assessing the degree of complexity in patterns. We aimed here at providing a robust and easily attainable method for introducing computer-assisted techniques to histopathology laboratories. Slides from two databases were used: A) Breast Cancer Histopathological; and B) Grand Challenge on Breast Cancer Histology. Set A contained 2480 images from 24 patients with benign alterations, and 5429 images from 58 patients with breast cancer. Set B comprised 100 images of each type: normal tissue, benign alterations, in situ carcinoma, and invasive carcinoma. All images were analyzed with the FracLac algorithm in the ImageJ computational environment to yield the box count fractal dimension (Db) results. Images on set A on 40x magnification were statistically different (p = 0.0003), whereas images on 400x did not present differences in their means. On set B, the mean Db values presented promising statistical differences when comparing. Normal and/or benign images to in situ and/or invasive carcinoma (all p < 0.0001). Interestingly, there was no difference when comparing normal tissue to benign alterations. These data corroborate with previous work in which fractal analysis allowed differentiating malignancies. Computer-aided diagnosis algorithms may beneficiate from using Db data; specific Db cut-off values may yield ~ 99% specificity in diagnosing breast cancer. Furthermore, the fact that it allows assessing tissue complexity, this tool may be used to understand the progression of the histological alterations in cancer.

New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds (6 라운드로 축소된 Sparkle384와 7 라운드로 축소된 Sparkle512에 대한 새로운 구별 공격)

  • Deukjo Hong;Donghoon Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.869-879
    • /
    • 2023
  • Sparkle is one of the finalists in the Lightweight Cryptography Standardization Process conducted by NIST. It is a nonlinear permutation and serves as a core component for the authenticated encryption algorithm Schwaemm and the hash function Esch. In this paper, we provide specific forms of input and output differences for 6 rounds of Sparkle384 and 7 rounds of Sparkle512, and make formulas for the complexity of finding input pairs that satisfy these differentials. Due to the significantly lower complexity compared to similar tasks for random permutations with the same input and output sizes, they can be valid distinguishing attacks. The numbers(6 and 7) of attacked rounds are very close to the minimum numbers(7 and 8) of really used rounds.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Development and Analysis of Community Based Independent Home Care Nursing Service (지역사회중심의 독립형 가정간호 시범사업소 운영체계 개발 및 운영결과 분석)

  • Park, Jung-Ho;Kim, Mae-Ja;Hong, Kyung-Ja;Han, Kyung-Ja;Park, Sung-Ae;Yun, Soon-Nyoung;Lee, In-Sook;Cho, Hyun;Bang, Kyung-Sook
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.6
    • /
    • pp.1455-1466
    • /
    • 2000
  • The purpose of this study was to develop the framework of community-based home care nursing delivery system, and to demonstrate and evaluate the efficiency of it. The study was carned out over a period of 3years from September 1996 to August 1999. The researchers developed Standards for operations, this was all aimed toward a home care recording system, and an assessment intervention algorithm for various diseases quality control and standardization. In the center, 185 patients enrolled, and of the enrollments cerebrovascular disorder and cancer were the most prevailment diseases. Also, a home care nursing activity classification was developed in six domains. Those domains were assessment, medication, treatment, education and consultation, emotional care, and referral or follow-up care. Ten sub-domains were divided according to the systematic needs. Among these nursing activities, treatment, assessment, and education and consultation were frequently performed. In sub-domain classification, skin integrity, respiration, circulation, and immobility related care were provided most frequently. The cost of home care nursing per visit was also suggested. The cost include direct and indirect nursing care, management, and transportation cost. Also, the researchers tried to overcome the limitations of hospital-based home care to provide more accessible, efficient, safe, and stable home care nursing. Therefore, clients were referred from other patients, families, public health care centers, industries, and even hospitals. As a result of this study, several limitations of operation were found. First, it was difficult to manage and communicate with doctor in the emergency situations. Second, there was too much time spent for transportation. This was because they are only five nurses, who cover all of the areas of Seoul and nearby cities. Third, preparation for special care of home care nurses was lacking. Fourth, criteria for the termination of care and the frequency of home visits were ambiguous. Finally, interconnection with home care machinery company was so yely needed. New paragraphs' strategies for solving these problems were suggested. This study will be the basis of community-based home care nursing, and the computerized information delivery system for home care nursing in Korea.

  • PDF