• Title/Summary/Keyword: Key size

Search Result 1,781, Processing Time 0.036 seconds

Study on the Magnetic Characteristics of Anisotropic SmCo7-type Alloys Synthesized by High-energy Surfactant-assisted Ball Milling

  • Yu, N.J.;Zhang, P.Y.;Shi, Y.J.;Pan, M.X.;Zhang, S.Y.;Ge, H.L.;Lu, Y.C.
    • Journal of Magnetics
    • /
    • v.19 no.4
    • /
    • pp.340-344
    • /
    • 2014
  • An effective process was employed for synthesizing anisotropic magnetic $SmCo_7$-type alloy flakes with high coercivity, which is highly desirable for many applications. The highest coercivity of 16.3 kOe corresponds to a typical flake thickness of 200 nm for the 3-h ball-milled sample. The anisotropy field was calculated by measuring the parallel and perpendicular directions to the easy magnetization direction of the powders. The anisotropy field decreased with the increase of the ball milling time, thus indicating that the decrease of coercivity was mainly caused by the reduction of the anisotropy field. Microstructure analysis indicated that the morphology, grain size, and anisotropy field of these samples have a great influence on the magnetic properties.

Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.17 no.5
    • /
    • pp.362-370
    • /
    • 2013
  • In this paper, we propose a novel optical implementation of a 3DES algorithm based on dual XOR logic operations for a cryptographic system. In the schematic architecture, the optical 3DES system consists of dual XOR logic operations, where XOR logic operation is implemented by using a free-space interconnected optical logic gate method. The main point in the proposed 3DES method is to make a higher secure cryptosystem, which is acquired by encrypting an individual private key separately, and this encrypted private key is used to decrypt the plain text from the cipher text. Schematically, the proposed optical configuration of this cryptosystem can be used for the decryption process as well. The major advantage of this optical method is that vast 2-D data can be processed in parallel very quickly regardless of data size. The proposed scheme can be applied to watermark authentication and can also be applied to the OTP encryption if every different private key is created and used for encryption only once. When a security key has data of $512{\times}256$ pixels in size, our proposed method performs 2,048 DES blocks or 1,024 3DES blocks cipher in this paper. Besides, because the key length is equal to $512{\times}256$ bits, $2^{512{\times}256}$ attempts are required to find the correct key. Numerical simulations show the results to be carried out encryption and decryption successfully with the proposed 3DES algorithm.

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation

  • Zhang, Mingming;Zhou, Quan;Hu, Yanlang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.404-421
    • /
    • 2020
  • A reversible data hiding scheme in JPEG compressed bitstreams is proposed, which could avoid decoding failure and file expansion by means of removing of bitstreams corresponding to high frequency coefficients and embedding of secret data in file header as comment part. We decode original JPEG images to quantified 8×8 DCT blocks, and search for a high frequency as an optimal termination point, beyond which the coefficients are set to zero. These blocks are separated into two parts so that termination point in the latter part is slightly smaller to make the whole blocks available in substitution. Then spare space is reserved to insert secret data after comment marker so that data extraction is independent of recovery in receiver. Marked images can be displayed normally such that it is difficult to distinguish deviation by human eyes. Termination point is adaptive for variation in secret size. A secret size below 500 bits produces a negligible distortion and a PSNR of approximately 50 dB, while PSNR is also mostly larger than 30 dB for a secret size up to 25000 bits. The experimental results show that the proposed technique exhibits significant advantages in computational complexity and preservation of file size for small hiding capacity, compared to previous methods.

Size Effect of Axial Compressive Strength of CFRP Confined Concrete Cylinders

  • Akogbe, Romuald-Kokou;Liang, Meng;Wu, Zhi-Min
    • International Journal of Concrete Structures and Materials
    • /
    • v.5 no.1
    • /
    • pp.49-55
    • /
    • 2011
  • The main objective of this investigation is to study size effect on compressive strength of CFRP confined concrete cylinders subjected to axial compressive loading. In total 24 concrete cylinders with different sizes were tested, small specimens with a diameter of 100 mm and a height of 200 mm, medium specimens with a diameter of 200 mm and a height of 400 mm, and big specimens with a diameter of 300 mm and a height of 600 mm. The lateral confining pressure of each specimen is the same and from that hypothesis the small specimens were confined with one layer of CFRP, medium and big specimens were performed by two and three layers of CFRP respectively. Test results indicate a significant enhancement in compressive strength for all confined specimens, and moreover, the compressive strengths of small and medium specimens are almost the same while a bit lower for big specimens. These results permit to conclude that there is no size effect on compressive strength of confined specimens regardless of cylinder dimension.

Characterization of the PAC Modified Cationic Rosin Size and its Sizing Effect

  • Yan, Yong-Xiang;Chandranupap, Fu-Shan;Wang, Gao-Sheng
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.387-390
    • /
    • 2006
  • Cationic rosin sizes are prepared by premixing extremely pure ployaluminum chloride (PAC) and dispersed rosin size (DRS). It turned out that zeta potential and particle size of the sizing agents took a big change by Plus90 analyzer's and FTIR analyzer's analysis. It turned out that -C=O and -COOH of the DRS have both chemical reaction with PAC to form the muti-hydroxyl aluminum rosin acid and that the cationic rosin sizes modified by PAC has dissymmetric and symmetric flexible vibration two absorbing peaks of the groups (its absorbing peaks $at1596cm^{-1}\;and\;1425cm^{-1}$). By DRS reacting with PAC, zeta potential of the resin size varied from negative to cationic. $Al_{2}O_{3}/rosin=1:0.3$, zeta potential of premixed admixture is tiptop28.8mv, When joined continuously PAC, zeta potential of cationic rosin sizes descend on the contrary.

  • PDF

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Model for simulating the effects of particle size distribution on the hydration process of cement

  • Chen, Changjiu;An, Xuehui
    • Computers and Concrete
    • /
    • v.9 no.3
    • /
    • pp.179-193
    • /
    • 2012
  • The hydration of cement contributes to the performance characteristics of concrete, such as strength and durability. In order to improve the utilization efficiency of cement and its early properties, the particle size distribution (PSD) of cement varies considerably, and the effects of the particle size distribution of cement on the hydration process should be considered. In order to evaluate effects of PSD separately, experiments testing the isothermal heat generated during the hydration of cements with different particle size distributions but the same chemical composition have been carried out. The measurable hydration depth for cement hydration was proposed and deduced based on the experimental results, and a PSD hydration model was developed in this paper for simulating the effects of particle size distribution on the hydration process of cement. First, a reference hydration rate was derived from the isothermal heat generated by the hydration of ordinary Portland cement. Then, the model was extended to take into account the effect of water-to-cement ratio, hereinafter which was referred to as PSD hydration model. Finally, the PSD hydration model was applied to simulate experiments measuring the isothermal heat generated by the hydration of cement with different particle size distributions at different water-to-cement ratios. This showed that the PSD hydration model had simulated the effects of particle size distribution and water-to-cement ratio on the hydration process of cement with satisfactory accuracy.

Oviduct-specific Glycoprotein 1 Locus is Associated with Litter Size and Weight of Ovaries in Pigs

  • Niu, B.Y.;Xiong, Y.Z.;Li, F.E.;Jiang, S.W.;Deng, C.Y.;Ding, S.H.;Guo, W.H.;Lei, M.G.;Zheng, R.;Zuo, B.;Xu, D.Q.;Li, J.L.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.19 no.5
    • /
    • pp.632-637
    • /
    • 2006
  • Oviduct-specific glycoprotein 1 (OVGP1) is implicated in playing a role in fertilization and early embryo development. In this study, we have obtained the sequence of intron 9 of OVGP1 gene in swine. Comparative sequencing of Meishan (a native Chinese breed) and Large White pig breeds revealed an A/T substitution at position 943. A PCR-EcoRI-RFLP assay was developed to detect this mutation. Polymorphism analysis in Qingping animals showed that pigs with BB genotype had lower number of piglets born alive (NBA) in multiple parities than pigs with AA (p<0.05) and AB genotype (p<0.01). In Large $White{\times}Meishan$ ($LW{\times}M$) $F_2$ offspring, the weight of both ovaries (OW) of the BB genotype was significantly lighter than that of AB (p = 0.05) and AA (p<0.01) genotypes. Analysis of the data also revealed that the mutation locus affected these two traits mostly by additive effects. These studies indicated that the polymorphism was associated with NBA and OW in two distinct populations and further investigations in more purebreds or crossbreds are needed to confirm these results.

New Constructions of Identity-based Broadcast Encryption without Random Oracles

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.428-439
    • /
    • 2011
  • The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. In this paper, we present a new construction based on the identity. Our construction contains the desirable features, such as constant size ciphertexts and private keys, short public keys and not fixing the total number of possible users in the setup. In addition, the proposed scheme achieves the full security which is stronger than the selective-identity security. Furthermore we show that the proof of security does not rely on the random oracles. To the best our knowledge, it is the first efficient scheme that is full security and achieves constant size ciphertexts and private keys which solve the trade-off between the ciphertext size and the private key size.

An Empirical Study of Minimum Required Size and the Minimum Number of Targets for Pen Input on the Small Display (소형 정보기기의 화면 디자인에서 최적의 펜입력을 위한 구성요소의 크기와 개수에 대한 경험적 연구)

  • Park, Jeong-Soon
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.61-68
    • /
    • 2004
  • A great variety of handheld device are coming onto the market. Some have advanced features compacted into very small sized hardware. In order to maximize the capability of these devices, we need to understand the characteristics of different input methods and utilize them in a sufficient way. Our study aims to understand characteristics of each device, so that we can design user interfaces more effectively. Two experiments were conducted to compare target pointing performance with a pen and with a hardware key on small displays. In experiment 1, we examined participants' performance of target pointing with both input methods at different target sizes. It was found that pen operation is more erroneous than key based operation when target size is smaller than 5mm, but at a target size of 5mm, the error rate decreased to the same level as for key input. In experiment 2, we examined the effect of the number of targets. The results showed, with a target size of 5mm, the pen could point to targets quicker than with key input, when the distance to the target exeeds a path length of 3 steps.

  • PDF