• Title/Summary/Keyword: Application signatures

Search Result 58, Processing Time 0.023 seconds

Application of Time Domain Reflectometry to the Monitoring or Rock Mass Deformation with Coaxial Cable (동축 케이블을 이용한 시간영역 반사법의 암반변위 계측에의 적용)

  • 정슬람;정소걸;정현기;박철환;박철환;이희근
    • Tunnel and Underground Space
    • /
    • v.6 no.4
    • /
    • pp.306-315
    • /
    • 1996
  • This paper presents an application of the TDR(Time Domain Reflectometry) to the monitoring of the deformation of rock mass with grouted coaxial cables through laboratory tests. The grouted cable can easily deform together with the rock mass movements, and the deformed cable loses its original capacitance and the reflected waveform produced along the deformed cable consequently represents a change of voltage pulse. Therefore, it is possible to monitor the deformation of rock mass by measuring the changes in these reflection signatures. Shear test of the cemented mortar containing a specimen of coaxial cable showed that the shear deformation correlated linearly with the reflection coefficient, so the TDR was effective to monitor the displacement of the rock mass. Bending test were carried out in order to determine the influence of the crooked cables on the monitoring of rock mass movements. Controlled cirmping and shearing test upon a cable of 50 m long, 12.7 mm diameter showed not only the fact that the reflection amplitudes decreased as the cable length increased but also the proper crimping depth, width and interval between two adjacent crimps. Two coaxial cables-one 100 m long and other 175m long-were installed and grouted into the separate boreholes drilled in a sedimentary formation. The behavior of the cable was monitored with metallic TDR cable tester to measure rock mass deformation based on the interpretative techniques developed through laboratory tests.

  • PDF

A hybrid structural health monitoring technique for detection of subtle structural damage

  • Krishansamy, Lakshmi;Arumulla, Rama Mohan Rao
    • Smart Structures and Systems
    • /
    • v.22 no.5
    • /
    • pp.587-609
    • /
    • 2018
  • There is greater significance in identifying the incipient damages in structures at the time of their initiation as timely rectification of these minor incipient cracks can save huge maintenance cost. However, the change in the global dynamic characteristics of a structure due to these subtle damages are insignificant enough to detect using the majority of the current damage diagnostic techniques. Keeping this in view, we propose a hybrid damage diagnostic technique for detection of minor incipient damages in the structures. In the proposed automated hybrid algorithm, the raw dynamic signatures obtained from the structure are decomposed to uni-modal signals and the dynamic signature are reconstructed by identifying and combining only the uni-modal signals altered by the minor incipient damage. We use these reconstructed signals for damage diagnostics using ARMAX model. Numerical simulation studies are carried out to investigate and evaluate the proposed hybrid damage diagnostic algorithm and their capability in identifying minor/incipient damage with noisy measurements. Finally, experimental studies on a beam are also presented to compliment the numerical simulations in order to demonstrate the practical application of the proposed algorithm.

Diagnostics and Prognostics Based on Adaptive Time-Frequency Feature Discrimination

  • Oh, Jae-Hyuk;Kim, Chang-Gu;Cho, Young-Man
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.9
    • /
    • pp.1537-1548
    • /
    • 2004
  • This paper presents a novel diagnostic technique for monitoring the system conditions and detecting failure modes and precursors based on wavelet-packet analysis of external noise/vibration measurements. The capability is based on extracting relevant features of noise/vibration data that best discriminate systems with different noise/vibration signatures by analyzing external measurements of noise/vibration in the time-frequency domain. By virtue of their localized nature both in time and frequency, the identified features help to reveal faults at the level of components in a mechanical system in addition to the existence of certain faults. A prima-facie case is made via application of the proposed approach to fault detection in scroll and rotary compressors, although the methods and algorithms are very general in nature. The proposed technique has successfully identified the existence of specific faults in the scroll and rotary compressors. In addition, its capability of tracking the severity of specific faults in the rotary compressors indicates that the technique has a potential to be used as a prognostic tool.

On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem (RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법)

  • Choi, Kyung-yong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.327-338
    • /
    • 2018
  • On-line/off-line signature is a technique for performing heavy computations required for signature generation in the off-line stage and completing the final signature by a simple operation in the online stage. This is suitable for application environments that require immediate signing responses to multiple users. In this paper, we propose two new on-line/off-line signature schemes based on RSA problem. The first technique can generate a signature with a fixed base exponentiation when signing online, and the second technique can complete an online signature with a very simple calculation such as a hash operation. The security of both signatures is based on the RSA problem, which is proven to be tightly secure without security loss in the random oracle model.

Monitoring of Graveyards in Mountainous Areas with Simulated KOMPSAT-2 imagery

  • Chang, Eun-Mi;Kim, Min-Ho;Lee, Byung-Whan;Heo, Min
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1409-1411
    • /
    • 2003
  • The application of simulated KOMPSAT-2 imagery to monitor graveyards is to be developed. Positions calculated from image were compared with those obtained from Geographic Positioning System. With 24 checkpoints, the position of graveyards showed within 5-meter range. Unsupervised classification, supervised classification, and objected-orientation classification algorithms were used to extract the graveyard. Unsupervised classification with masking processes based on National topographic data gives the best result. The graveyards were categorized with four types in field studies while the two types of graveyards were shown in descriptive statistics. Cluster Analysis and discriminant analysis showed the consistency with two types of tombs. It was hard to get a specific spectral signature of graveyards, as they are covered with grasses at different levels and shaded from the surrounding trees. The slopes and aspects of location of graveyards did not make any difference in the spectral signatures. This study gives the basic spectral characteristics for further development of objected-oriented classification algorithms and plausibility of KOMPSAT-2 images for management of mountainous areas in the aspect of position accuracy and classification accuracy.

  • PDF

HisCoM-mimi: software for hierarchical structural component analysis for miRNA-mRNA integration model for binary phenotypes

  • Kim, Yongkang;Park, Taesung
    • Genomics & Informatics
    • /
    • v.17 no.1
    • /
    • pp.10.1-10.3
    • /
    • 2019
  • To identify miRNA-mRNA interaction pairs associated with binary phenotypes, we propose a hierarchical structural component model for miRNA-mRNA integration (HisCoM-mimi). Information on known mRNA targets provided by TargetScan is used to perform HisCoM-mimi. However, multiple databases can be used to find miRNA-mRNA signatures with known biological information through different algorithms. To take these additional databases into account, we present our advanced application software for HisCoM-mimi for binary phenotypes. The proposed HisCoM-mimi supports both TargetScan and miRTarBase, which provides manually-verified information initially gathered by text-mining the literature. By integrating information from miRTarBase into HisCoM-mimi, a broad range of target information derived from the research literature can be analyzed. Another improvement of the new HisCoM-mimi approach is the inclusion of updated algorithms to provide the lasso and elastic-net penalties for users who want to fit a model with a smaller number of selected miRNAs and mRNAs. We expect that our HisCoM-mimi software will make advanced methods accessible to researchers who want to identify miRNA-mRNA interaction pairs related with binary phenotypes.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

A study on Secure Payment Method & Security Technology of Electronic Commerce (전자상거래의 보안기술과 지불방법에 관한 연구)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.35-52
    • /
    • 1999
  • This study introduced the new technologies that are expanding the realm of electronic commerce to the Internet and small business. Each of the key components of electronic commerce(contracts, signatures, notaries, payment systems and adult trails)are supported in the new electronic commerce. Electronic commerce is more than just handling purchase transactions and funds transfers over the internet. Despite Electronic commerce's past roots in transactions between large corporations, banks, and other financial institutions, the use of the internet as a way to bring Electronic commerce to the individual consumer has led to shift in viewpoint. Over the past few years, both the press and the business community have increased their focus on Electronic commerce involving the consumer Effective payment system should be established for the internet commerce. In this study, we examined the current development and application of Electronic payment system. Two different payment systems are used and under application. One is IC-card type of payment system which has gained popularity in England, Hong-Kong, and many other countries as a substitution of cash. The other type of payment system is e-cash, which is used more conveniently for the payment through internet. The question of which method is better fitted for the internet commerce should be evaluated in the view of cost and benefit since the associated technology is still under evolution. This study conducted a study on Secure Payment Method & Security Technology of Electronic Commerce

  • PDF

A Study on the Heat Flow Analysis of Infra-Red Signature Suppression System for Naval Ship (함정 적외선 신호저감 장치의 열 유동해석 연구)

  • Yoon, Seok-Tae;Cho, Yong-Jin;Ko, Dae-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.740-746
    • /
    • 2017
  • Infrared signatures emitted from hot exhaust gases generated by the internal combustion engine and generator of naval ships and from the metal surfaces of the funnel have become the targets of infrared homing missiles, which is the main cause of a reduced survivability of naval ships. The infrared signatures from the exhaust gas and the metal surface of a funnel can be reduced by installing an infrared signature suppression (IRSS) system on a ship. The IRSS system consists of three parts: an eductor that generates turbulent flow of the exhaust gas, a mixing tube that mixes the exhaust gas with ambient air, and a diffuser that forms an air film using the pressure difference between the inside and outside air. As a basic study to develop an IRSS system using domestic technology, this study analyzed the model test conditions of an IRSS system developed by an overseas engineering company and installed on a domestic naval ship, and a numerical heat-flow analysis was conducted based on the results of the aforementioned analysis. Numerical heat-flow analysis was performed using a commercial numerical-analysis application, and various turbulence models were considered. As a result, the temperature and velocity of the exhaust gas at the educator inlet and diffuser outlet and that of the metal surface of the diffuser were measured, and found to agree well with the measurement results of the model test.