• Title/Summary/Keyword: Mutual Identification

Search Result 106, Processing Time 0.026 seconds

Understanding of the Sameum-Samyang in "Dong-uisusebowon(東醫壽世保元)" ("동의수세보원(東醫壽世保元)"의 삼음삼양(三陰三陽) 인식(認識))

  • Jang, Woo-Chang
    • Journal of Korean Medical classics
    • /
    • v.23 no.1
    • /
    • pp.303-316
    • /
    • 2010
  • Ijema's four constitution theory is the result of creative succession which is originated from the "Hwangjenaegyeong(黃帝內經)", and shaped up as "Sanghanron(傷寒論)", the key of Ijema's theory would be the re-explnation of the Sameum-Samyang pattern identification. therefore, we should recognize that the four constitution theory is related to the Sameum-Samyang identification of "Sanghanron(傷寒論)". And is even on the mutual supporting relation. from this point of view, the "Dong-uisusebowon(東醫壽世保元)" could be valuated as a commentary of "Sanghanron(傷寒論)" which shows us that how to review the Sameum-Samyang identification as the point of characteristic of four constitution theory.

Flow Pattern Identification of Vertical Upward Two-Phase Flow Using the Attractor-Density-Map Analysis of the Void Fraction Signal in the Nonlinear Phase Space (비선형 위상공간에서의 기포 분율 신호의 끌개밀도분식을 이용한 수직 상향 이상유동의 유동패턴분류)

  • Kim, Nam-Seok;Lee, Jae-Young
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.11
    • /
    • pp.1398-1406
    • /
    • 2004
  • The nonlinear signals from an impedance meter for the area average void fraction in two-phase flow have been analyzed to construct a phase space trajectory. The pseudo phase space was constructed with the time delay and proper dimensions. The time delay and the embedding dimension were chosen by the average mutual information and by the false nearest neighborhood, respectively. The attractor-density-map of projected states was used to produce the two dimensional probability distribution functions (2D-PDF). Since the developed 2D-PDF showed clear distinction of the flow patterns, the flow regime identification was made with three rules and with the 2D-PDF. Also, the transition criteria of Mishima-Ishii agree well with the present results.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

CORBA-based Mutual Authentication Service for Subjects of Electronic Commerce (전자상거래 주체간 CORBA 기반 상호 인증 서비스)

  • Jang, Gyeong-A;Kim, Tae-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1237-1247
    • /
    • 1999
  • 이질적 분산 환경에서 전자 상거래는 신임장을 기반으로 상거래 참여자들에 대한 인증 서비스가 제공되어야 한다. 본 연구에서는 CORBA 보안 명세 1 를 기반으로 전자 상거래 참여자들에 대한 객체 단위 인증 및 권한 부여 기법을 제공하는 상호 인증 서비스 구조를 제안한다. 이 구조는 Kerberos 2 의 인증 기법 및 인증 키 교환 기법으로 전자 상거래 참여자간에 상대 주체의 신원 확인 뿐 아니라 거래 진행 중 취득한 정보의 근원을 파악할 수 있도록 하였다. 또한 Kerberos 기법을 CORBA 플랫폼 기반의 상호 인증 구조로서 분산 환경에 대해 확장하였으므로 키 관리 등 보안 정보 관리에 있어 효율적이다.Abstract Electronic commerce shall provide its subjects with a credential-based authentication service in the heterogeneous distributed computing environment. In this paper, based on CORBA security service specification 1 which OMG defined, we propose the mutual authentication service for subjects of electronic commerce, providing the authentication of object level and the authenticated key exchange. This proposed structure, by Kerberos 2 for the authentication and the authenticated key exchange, assures not only the identification of a partner but also the confidence of origin of business item for negotiations between subjects of electronic commerce. Since our deployed Kerberos is extended to the mutual authentication service based on CORBA platform, it is efficient for security administration to manage the information such as a key management in the heterogeneous distributed computing environment.

Concept of Synchronized Individuation Based on the Characters in a Movie and a Fairy Tale

  • Moon, Duk-Soo;Bahn, Geon Ho
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.33 no.2
    • /
    • pp.48-54
    • /
    • 2022
  • Objectives: Among adolescent development tasks, being independent of parents is an essential process for emotional and physical separation. There are many conflicts of separation and individuation between parents and adolescents; however, most clinicians explore the process of separation and individuation only from adolescents' perspective. Whether simultaneously or sequentially, separation-individuation occurs between adolescents and parents, respectively. The authors have already introduced the theory of synchronized individuation in a clinical case to explain the concept of this intersubjective phenomena. This study also attempts to prove the synchronized individuation theory through the interaction of characters in a movie and a fairy tale. Methods: The authors present the basis for the theory of synchronized individuation of adolescence through the growing process of Mason Junior, the main character of the movie "Boyhood," and from the process of the separation of a hen, Sprout, and an orphaned duckling in "The hen who dreamed she could fly." Results: Synchronized individuation was developed and observed from Mason, the son's perspective in "Boyhood," and Sprout, the mother's subjective perspective in the story of the hen. Conclusion: Increasing conflict and mutual impact in the relationship between adolescents and parents, ambivalent feelings for separation, selective identification of each other, mutual respect through mutual recognition, and role changes in relationship position were confirmed. Sons and mothers were individualized with synchronization.

Identification of the associations between genes and quantitative traits using entropy-based kernel density estimation

  • Yee, Jaeyong;Park, Taesung;Park, Mira
    • Genomics & Informatics
    • /
    • v.20 no.2
    • /
    • pp.17.1-17.11
    • /
    • 2022
  • Genetic associations have been quantified using a number of statistical measures. Entropy-based mutual information may be one of the more direct ways of estimating the association, in the sense that it does not depend on the parametrization. For this purpose, both the entropy and conditional entropy of the phenotype distribution should be obtained. Quantitative traits, however, do not usually allow an exact evaluation of entropy. The estimation of entropy needs a probability density function, which can be approximated by kernel density estimation. We have investigated the proper sequence of procedures for combining the kernel density estimation and entropy estimation with a probability density function in order to calculate mutual information. Genotypes and their interactions were constructed to set the conditions for conditional entropy. Extensive simulation data created using three types of generating functions were analyzed using two different kernels as well as two types of multifactor dimensionality reduction and another probability density approximation method called m-spacing. The statistical power in terms of correct detection rates was compared. Using kernels was found to be most useful when the trait distributions were more complex than simple normal or gamma distributions. A full-scale genomic dataset was explored to identify associations using the 2-h oral glucose tolerance test results and γ-glutamyl transpeptidase levels as phenotypes. Clearly distinguishable single-nucleotide polymorphisms (SNPs) and interacting SNP pairs associated with these phenotypes were found and listed with empirical p-values.

New index for the gifted students(G-Index) with EEG analysis (뇌파검사 자료를 기반으로 한 과학영재 판별 지수(G-Index) 개발과 적용)

  • Kim, Kyung-Hwa;Kim, Kyu-Han;Lee, Sun-Kil;Hur, Myung;Kim, Yong-Jin
    • Journal of Gifted/Talented Education
    • /
    • v.15 no.1
    • /
    • pp.67-84
    • /
    • 2005
  • In this study we investigated the adequacy of tools for distinction gifted students through the comparison these mutual relation on the basis of data, like paper test, the depths interview score, and the rest data((TTCT: Torrance Tests of Creative Thinking, IQ test, FASP: Find A Shape Puzzle, V.T: Visualization Tests and Exp: experimental ability test), and analysis data of EEG test for examining the adequacy of tools for identification gifted students. So, we developed Brain Wave gifted Index(G-Index) for finding another distinction ability as using brain waves data. The standard of index development use gifted brain characteristic in closed-eyes rest state which is judged like that characteristic of distinction between gifted and normal students is the most clear and consistence. That is, the degree of unified pattern between each object and gifted PCA pattern was defined by Pearson method which added spatial mutual index to weight concept. This refer to mean number of spatial PCA pattern. Searching for the possibility of distinction gifted gave distinction effect in 76%. The result of regression analysis on the basis of mutual relation between the rest data is . The probability formula for distinct gifted group is as follow. $$P=\frac 1{1+e^{-[-0.018(TTCT)+0.057(IQ)+1.916(FASP)+0.682(V.T)+0.088(Exp.)+0.034(G-Index)-57.510]}}$$ The result of this calculation showed that probability for distinct in gifted group was very good(95.0%). On the basis of upper result, tools for identification gifted students should be estimated as using many-sided estimation data whatever possible. And following study about development, and operation of tools for distinction suitable to gifted student in science should be progressed.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Generalized Analysis on Validity of Sasang Type Diagnosis (사상체질 진단검사 타당성 분석지표의 일반화 연구)

  • Hwang, Sang-Moon;Park, So-Jung;Gang, Ki-Rim;Kwon, Young-Kyu;Chae, Han
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.23 no.5
    • /
    • pp.950-957
    • /
    • 2009
  • The purpose of this study was to develop generalized validity evaluation indexes for the Sasang type diagnostic test. As a generalized evaluation index for Sasang type diagnostic test, Generalized Squared Correlation (GC2), Mutual Information (I) and Mutual Information Coefficient (IC) as overall validity index, and Correlation Coefficient (C) and Mutual Information Contribution (ID) as type-specific validity index were suggested and the practicability of these indexes was assessed along with Percentage Correctly Predicted (PCP), adjusted PCP, type-specific sensitivity and type-specific specificity which was proposed previously. The usefulness of the nine validity indexes was examined using previously reported data and three mock Sasang type diagnosis results. We demonstrated here that the PCP is not adequate for the analysis of validity. We also showed that our validity index is recommendable for the comparison and improvement of Sasang type diagnosis. The generalized validity analysis of Sasang type diagnosis can provide a guideline for the development of new Sasang type diagnosis or pattern identification. The working sheet for calculating validity indexes can be acquired at http://www.sasangtypology.org/validity.