• Title/Summary/Keyword: Forward target method

Search Result 75, Processing Time 0.021 seconds

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

High Diversity Transceiver for Low Power Differentially Encoded OFDM System

  • Nadeem, Faisal;Zia, Muhammad;Mahmood, Hasan;Bhatti, Naeem;Haque, Ihsan
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.90-99
    • /
    • 2016
  • In this work, we investigate differentially encoded blind transceiver design in low signal-to-noise ratio (SNR) regimes for orthogonal frequency-division multiplexing (OFDM) signaling. Owing to the fact that acquisition of channel state information is not viable for short coherence times or in low SNR regimes, we propose a time-spread frequency-encoded method under OFDM modulation. The repetition (spreading) of differentially encoded symbols allows us to achieve a target energy per bit to noise ratio and higher diversity. Based on the channel order, we optimize subcarrier assignment for spreading (along time) to achieve frequency diversity of an OFDM modulated signal. We present the performance of our proposed transceiver design and investigate the impact of Doppler frequency on the performance of the proposed differentially encoded transceiver design. To further improve reliability of the decoded data, we employ capacity-achieving low-density parity-check forward error correction encoding to the information bits.

The Building for Safety Regulation DB of Urban Transit System Infrastructure used by Computer Design Tool (전산지원도구를 이용한 도시철도시설 안전기준 DB구축 연구)

  • Lee, Woo-Dong;Shin, Jeong-Ryul;Ahn, Tai-Ki
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.786-790
    • /
    • 2006
  • Urban rail transit offers target performance and function because various lower part system such as rolling-stock, signal, power and trackis consisted as complex. In order to function properly an urban rail transit which is complicated system to work as safety and reliability, System must secure safety with structure, design, manufacture, install and verification and it is important to establish a safety standard follows it procedures, establish what step all it is important to operate. Safety standard of urban transit infrastructure is minimum standard necessary to secure safety of signal, power and track. Urban rail transit standard business leads to make many requirements. Recently, many types of equipment have applied to manage requirements and standards for system efficiently in part of universal, airline and car accordingly applied equipments use to manage a pursuit(Trace) between standard of system. Especially importance of management is emphasized more become more. Importance of standard management which usesa computing support tool recently in transit filed is embossed and is predicted to be more such forward. Therefore we propose the effective method of management with infrastructure system by constructed data-base system.

  • PDF

The Robust Artillery Locating Radar Deployment Model Against Enemy' s Attack Scenarios (적 공격시나리오 기반 대포병 표적탐지레이더 배치모형)

  • Lee, Seung-Ryul;Lee, Moon-Gul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.217-228
    • /
    • 2020
  • The ROK Army must detect the enemy's location and the type of artillery weapon to respond effectively at wartime. This paper proposes a radar positioning model by applying a scenario-based robust optimization method i.e., binary integer programming. The model consists of the different types of radar, its available quantity and specification. Input data is a combination of target, weapon types and enemy position in enemy's attack scenarios. In this scenario, as the components increase by one unit, the total number increases exponentially, making it difficult to use all scenarios. Therefore, we use partial scenarios to see if they produce results similar to those of the total scenario, and then apply them to case studies. The goal of this model is to deploy an artillery locating radar that maximizes the detection probability at a given candidate site, based on the probability of all possible attack scenarios at an expected enemy artillery position. The results of various experiments including real case study show the appropriateness and practicality of our proposed model. In addition, the validity of the model is reviewed by comparing the case study results with the detection rate of the currently available radar deployment positions of Corps. We are looking forward to enhance Korea Artillery force combat capability through our research.

Ultrasonic Targeting of NK Cell in Vessel Bifurcation for Immunotherapy: Simulation and Experimental Validation

  • Saqib Sharif;Hyeong-Woo Song;Daewon Jung;Hiep Xuan Cao;Jong-Oh Park;Byungjeon Kang;Eunpyo Choi
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.6
    • /
    • pp.418-424
    • /
    • 2023
  • Natural killer (NK) cells play a crucial role in combating infections and tumors. However, their therapeutic application in solid tumors is hindered by challenges, such as limited lifespan, tumor penetration, and delivery precision. Our research introduces a novel ultrasonic actuation technique to navigate NK cells more effectively in the vascular system, particularly at vessel bifurcations where targeted delivery is most problematic. We use a hemispherical ultrasonic transducer array that generates phase-modulated traveling waves, focusing on an ultrasound beam to steer NK cells using blood-flow dynamics and a focused acoustic field. This method enables the precise obstruction of non-target vessels and efficiently directs NK cells toward the tumor site. The simulation results offer insights into the behavior of NK cells under various conditions of cell size, radiation pressure, and fluid velocity, which inform the optimization of their trajectories and increase targeting efficiency. The experimental results demonstrate the feasibility of this ultrasonic approach for enhancing NK cell targeting, suggesting a potential leap forward in solid tumor immunotherapy. This study represents a significant step in NK cell therapeutic strategies, offering a viable solution to the existing limitations and promising enhancement of the efficacy of cancer treatments.

Development of a highly effective T-DNA inserted mutant screening method in a Chinese cabbage (Brassica rapa L. spp. pekinensis) reverse genetics system

  • Lee, Gi-Ho;Kang, Yoon-Jee;Yi, Seul-Ki;Lim, Suk-Bin;Park, Young-Doo
    • Plant Biotechnology Reports
    • /
    • v.4 no.3
    • /
    • pp.201-211
    • /
    • 2010
  • We present a highly effective T-DNA inserted gene screening method as part of a reverse genetics model system using the Chinese cabbage (Brassica rapa L. spp. pekinensis). Three-step two-dimensional (2D) matrix strategies are potentially accurate and useful for the identification of specific T-DNA inserted mutants from a large population. To construct our Chinese cabbage model, we utilized a forward genetics screening approach for the abnormal phenotypes that were obtained from transgenic plants of Brassica rapa generated with Agrobacteria tumefaciens containing the pRCV2 vector. From one transgenic plant with an abnormal phenotype, we observed that the st1 gene (which is related to senescence-associated process proteins) contained a T-DNA fragment, and that its expression level was decreased. This T-DNA insert was then used as a control to construct an effective screening pool. As a result, the optimum template concentration was found to be 0.1-1 ng in our PCR strategy. For other conditions, positive changes to the Gibbs free energy prevented the formation of oligo dimers and hairpin loop structures, and autosegment extension gave better results for long fragment amplification. Using this effective reverse genetics screening method, only 23 PCR reactions were necessary to select a target gene from a pool of 100 individual DNAs. Finally, we also confirmed that the sequence we obtained from the above method was identical to the flanking sequence isolated by rescue cloning.

Electrical Impedance Tomography for Material Profile Reconstruction of Concrete Structures (콘크리트 구조의 재료 물성 재구성을 위한 전기 임피던스 단층촬영 기법)

  • Jung, Bong-Gu;Kim, Boyoung;Kang, Jun Won;Hwang, Jin-Ha
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.4
    • /
    • pp.249-256
    • /
    • 2019
  • This paper presents an optimization framework of electrical impedance tomography for characterizing electrical conductivity profiles of concrete structures in two dimensions. The framework utilizes a partial-differential-equation(PDE)-constrained optimization approach that can obtain the spatial distribution of electrical conductivity using measured electrical potentials from several electrodes located on the boundary of the concrete domain. The forward problem is formulated based on a complete electrode model(CEM) for the electrical potential of a medium due to current input. The CEM consists of a Laplace equation for electrical potential and boundary conditions to represent the current inputs to the electrodes on the surface. To validate the forward solution, electrical potential calculated by the finite element method is compared with that obtained using TCAD software. The PDE-constrained optimization approach seeks the optimal values of electrical conductivity on the domain of investigation while minimizing the Lagrangian function. The Lagrangian consists of least-squares objective functional and regularization terms augmented by the weak imposition of the governing equation and boundary conditions via Lagrange multipliers. Enforcing the stationarity of the Lagrangian leads to the Karush-Kuhn-Tucker condition to obtain an optimal solution for electrical conductivity within the target medium. Numerical inversion results are reported showing the reconstruction of the electrical conductivity profile of a concrete specimen in two dimensions.

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

A Feasibility Study in Forestry Crane-Tip Control Based on Kinematics Model (1): The RR Manipulator (기구학적 모델 기반 임업용 크레인 팁 제어방안에 관한 연구(1): RR 매니퓰레이터)

  • Kim, Ki-Duck;Shin, Beom-Soo
    • Journal of Korean Society of Forest Science
    • /
    • v.111 no.2
    • /
    • pp.287-301
    • /
    • 2022
  • This study aims to propose a crane-tip control method to intuitively control the end-effector vertically or horizontally for improving the crane work efficiency and to confirm the control performance. To verify the control performance based on experimental variables, a laboratory-scale crane was manufactured using an electric cylinder. Through a forward and reverse kinematics analysis, the crane was configured to output the position coordinates of the current crane-tip and the joint angle at each target point. Furthermore, a method of generating waypoints was used, and a dead band using lateral boundary offset (LBO) was set. Appropriate parameters were selected using bang-bang control, which confirmed that the number of waypoints and LBO radius were associated with positioning error, and the cylinder speed was related to the lead time. With increased number of waypoints and decreased LBO radius, the positioning error and the lead time also decreased as the cylinder speed decreased. Using the proportional control, when the cylinder velocity was changed at every control cycle, the lead time was greatly reduced; however, the actual control pattern was controlled by repeating over and undershoot in a large range. Therefore, proportional control was performed by additionally applying velocity gain that can relatively change the speed of each cylinder. Since the control performed with in a range of 10 mm, it was verified th at th e crane-tip control can be ach ieved with only th e proportional control to which the velocity gain was applied in a control cycle of 20 ms.

Design and Implementation of the ECBM for Inference Engine (추론엔진을 위한 ECBM의 설계 구현)

  • Shin, Jeong-Hoon;Oh, Myeon-Ryoon;Oh, Kwang-Jin;Rhee, Yang-Weon;Ryu, Keun-Ho;Kim, Young-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3010-3022
    • /
    • 1997
  • Expert system is one of AI area which was came out at the end of 19705s. It simulates the human's way of thinking to give solutions of Problem in many applications. Most expert system consists of many components such as inference engine, knowledge base, and so on. Especially the performance of expert system depends on the control of enfficiency of inference engine. Inference engine has to get features; tirst, if possible to minimize restrictions when the knowledge base is constructed second, it has to serve various kinds of inferencing methods. In this paper, we design and implement the inference engine which is able to support the general functions to knowledge domain and inferencing method. For the purpose, forward chaining, backward chaining, and direct chaining was employed as an inferencing method in order to be able to be used by user request selectively. Also we not on1y selected production system which makes one ease staradization and modulation to obtain knowledges in target domain, but also constructed knowledge base by means of Extended Clause Bit Metrics (ECBM). Finally, the performance evaluation of inference engine between Rete pattern matching and ECBM has been done.

  • PDF