• Title/Summary/Keyword: BRIP

Search Result 6, Processing Time 0.019 seconds

Close Surface Targets Detection using Background Removal Integral Projection in Coastal Environment (배경제거 가산투영 방법을 이용한 근거리 해상 표적 탐지)

  • Lee, Boohwan;Kim, Jieun;Yang, Yu Kyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.115-121
    • /
    • 2014
  • In this paper, we propose a robust background removal integral projection(BRIP) method which can detect close surface targets in coastal environment for IRST. Row pixels of background region from coastal infrared image show similar response. Thus, the proposed BRIP is calculated after horizontal and vertical background estimations and removals are performed sequentially. Finally, surface large targets can be detected using the results of the BRIP. Experimental results on a set of real infrared image sequence show that the proposed method could fully detect ships in every frame.

A Blinding-Based Scalar Multiplication Algorithm Secure against Power Analysis Attacks (전력분석공격에 대한 블라인딩 기반의 상수배 알고리즘)

  • Kim, Chang-Kyun;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.117-121
    • /
    • 2007
  • Most existing countermeasures against classical DPA are vulnerable to new DPA, e.g., refined power analysis attack (RPA), zero-value point attack (ZPA), and doubling attack. More recently, Mamiya et al proposed a new countermeasure (so-called BRIP) against RPA, ZPA, classical DPA and SPA. This countermeasure, however, also has a vulnerability of scalar multiplication computations by exploiting specially chosen input message. Therefore, to prevent various power analysis attacks like DPA and new SPA, we propose an enhanced countermeasure by developing a new random blinding technique.

Hereditary Genes and SNPs Associated with Breast Cancer

  • Mahdi, Kooshyar Mohammad;Nassiri, Mohammad Reza;Nasiri, Khadijeh
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.6
    • /
    • pp.3403-3409
    • /
    • 2013
  • Breast cancer is the most common cancer among women affecting up to one third of tehm during their lifespans. Increased expression of some genes due to polymorphisms increases the risk of breast cancer incidence. Since mutations that are recognized to increase breast cancer risk within families are quite rare, identification of these SNPs is very important. The most important loci which include mutations are; BRCA1, BRCA2, PTEN, ATM, TP53, CHEK2, PPM1D, CDH1, MLH1, MRE11, MSH2, MSH6, MUTYH, NBN, PMS1, PMS2, BRIP1, RAD50, RAD51C, STK11 and BARD1. Presence of SNPs in these genes increases the risk of breast cancer and associated diagnostic markers are among the most reliable for assessing prognosis of breast cancer. In this article we reviewed the hereditary genes of breast cancer and SNPs associated with increasing the risk of breast cancer that were recently were reported from candidate gene, meta-analysis and GWAS studies. SNPs of genes associated with breast cancer can be used as a potential tool for improving cancer diagnosis and treatment planning.

The Spectrum of Genetic Mutations in Breast Cancer

  • Sheikh, Asfandyar;Hussain, Syed Ather;Ghori, Quratulain;Naeem, Nida;Fazil, Abul;Giri, Smith;Sathian, Brijesh;Mainali, Prajeena;Al Tamimi, Dalal M
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.6
    • /
    • pp.2177-2185
    • /
    • 2015
  • Breast cancer is the most common malignancy in women around the world. About one in 12 women in the West develop breast cancer at some point in life. It is estimated that 5%-10% of all breast cancer cases in women are linked to hereditary susceptibility due to mutations in autosomal dominant genes. The two key players associated with high breast cancer risk are mutations in BRCA 1 and BRCA 2. Another highly important mutation can occur in TP53 resulting in a triple negative breast cancer. However, the great majority of breast cancer cases are not related to a mutated gene of high penetrance, but to genes of low penetrance such as CHEK2, CDH1, NBS1, RAD50, BRIP1 and PALB2, which are frequently mutated in the general population. In this review, we discuss the entire spectrum of mutations which are associated with breast cancer.

Classification of Biological Effect of 1,763 MHz Radiofrequency Radiation Based on Gene Expression Profiles

  • Im, Chang-Nim;Kim, Eun-Hye;Park, Ae-Kyung;Park, Woong-Yang
    • Genomics & Informatics
    • /
    • v.8 no.1
    • /
    • pp.34-40
    • /
    • 2010
  • Radiofrequency (RF) radiation might induce the transcription of a certain set of genes as other physical stresses like ionizing radiation and UV. To observe transcriptional changes upon RF radiation, we exposed WI-38, human lung fibroblast cell to 1763 MHz of mobile phone RF radiation at 60 W/kg of specific absorption rate (SAR) for 24h with or without heat control. There were no significant changes in cell numbers and morphology after exposure to RF radiation. Using quantitative RT-PCR, we checked the expression of three heat shock protein (HSP) (HSPA1A, HSPA6 and HSP105) and seven stress-related genes (TNFRSF11B, FGF2, TGFB2, ITGA2, BRIP1, EXO1, and MCM10) in RF only and RF/HS groups of RF-exposed cells. The expressions of three heat shock proteins and seven stress-related genes were selectively changed only in RF/HS groups. Based on the expression of ten genes, we could classify thermal and non-thermal effect of RF-exposure, which genes can be used as biomarkers for RF radiation exposure.

Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA

  • Kim, Hee-Seok;Kim, Tae-Hyun;Yoon, Joong-Chul;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.102-111
    • /
    • 2010
  • Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-random-initial-point algorithm on elliptical curve cryptosystems. It is known to be secure against first-order differential power analysis (DPA); however, it is susceptible to second-order DPA. Although second-order DPA gives some solutions for defeating message blinding methods, this kind of attack still has the practical difficulty of how to find the points of interest, that is, the exact moments when intermediate values are being manipulated. In this paper, we propose a practical second-order correlation power analysis (SOCPA). Our attack can easily find points of interest in a power trace and find the private key with a small number of power traces. We also propose an efficient countermeasure which is secure against the proposed SOCPA as well as existing power attacks.