• Title/Summary/Keyword: Signature-based

Search Result 1,035, Processing Time 0.026 seconds

A Study on the Construction of the Automatic Extracts and Summaries - On the Basis of Scientific Journal Articles - (자동 발췌문/요약 시스템 구축에 관한 연구 - 학술지 논문기사를 중심으로 -)

  • Lee Tae-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.3
    • /
    • pp.139-163
    • /
    • 2005
  • Various corpus-based approaches, rhetorical roles of discourse structure, and unifications of similar sentences were applied to construct the automatic Ext/Sums(extracts and summaries). Rhetorical roles of sentences like objective, method, background, result, conclusion, etc. for making elastic Ext/Sums were established and extraction engines according to respective role were prepared. The $90\%$ of Success rate in extracting the important sentences of sample articles was accomplished. Rearranging the selected sentences, it used unification of similar sentences using the cosine coefficient equation, deletion of unnecessary modification and insertion clauses, junction of short sentences, and connection of sentences able to link. They suggest the methods applying rhetorical roles of sentences, meaning and signature of noun and verb in clauses, and cue words and location will be researched to construct the more effective Ext/Sums.

Development of Guideline on Electronic Signatures for Electronic Medical Record (전자의무기록에 대한 공인전자서명 적용 지침 개발)

  • Park Jeong-Seon;Shin Yong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.120-128
    • /
    • 2005
  • One of the most secure ways of maintaining the confidentiality and integrity of electronic information is to use electronic signatures. So, in this paper, we developed guideline on electronic signatures for EMR(electronic medical record) based on the Medical Law and the Electronic Signature Act. This guideline is intended to introduce EMR easily in the medical field and to facilitate the promotion of EMR. We developed it through consulting from the advisory committee that was made up of experts in the fields of medical record, EMR system and electronic signatures. The contents of the guideline consist of subject and time stamp of electronic signatures, validity of a certificate, management of electronic signatures and custody and management of EMR. In the future, we will develop practical cases and promote educations and publicities of them to use in the medical institutes and EMR system related industries.

  • PDF

A Watermarking Scheme to Extract the Seal Image without the Original Image (원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법)

  • Kim, Won-Gyum;Lee, Jong-Chan;Lee, Won-Don
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3885-3895
    • /
    • 2000
  • The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

  • PDF

Research on OS fingerprinting Method for Real-time Traffic Analysis System (실시간 트래픽 분석을 위한 운영체제 판별 방법에 관한 연구)

  • Lee, Hyun-Shin;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.443-450
    • /
    • 2011
  • The Internet has become an essential part in our modern life by providing useful information. So, the volume of Internet traffic has been increasing rapidly, which emphasizes the importance of network traffic analysis for effective network operation and management. Signature based analysis have been commonly used, but it is shown that the increase of signatures due to the increase of applications causes the performance degradation of real-time traffic analysis on high-speed network links. In this paper, we propose OS fingerprinting method for real-time traffic analysis. The previous problems can be solved by utilizing the OS information. The OS fingerprinting method for real-time traffic analysis, proposed in this paper, conducts under passive mode, and improves the limitation of a previous method such as low completeness and accuracy. In this paper, we enlarged an input data to improve completeness, and used the User-Agent field in HTTP packet to extract various OS signatures. Also, we changed an input data from packet to flow to improve accuracy.

ZAS3 promotes TNFα-induced apoptosis by blocking NFκB-activated expression of the anti-apoptotic genes TRAF1 and TRAF2

  • Shin, Dong-Hyeon;Park, Kye-Won;Wu, Lai-Chu;Hong, Joung-Woo
    • BMB Reports
    • /
    • v.44 no.4
    • /
    • pp.267-272
    • /
    • 2011
  • ZAS3 is a large zinc finger transcription repressor that binds the ${\kappa}B$-motif via two signature domains of ZASN and ZASC. A loss-of-function study showed that lack of ZAS3 protein induced accelerated cell proliferation and tumorigenesis. Conversely, gain-of-function studies showed that ZAS3 repressed $NF{\kappa}B$-activated transcription by competing with $NF{\kappa}B$ for the ${\kappa}B$-motif. Based on these observations, we hypothesize that ZAS3 promotes apoptosis by interrupting anti-apoptotic activity of $NF{\kappa}B$. Here, we present evidence that upon $TNF{\alpha}$ stimulation, ZAS3 inhibits $NF{\kappa}B$-mediated cell survival and promotes caspase-mediated apoptosis. The inhibitory effect of ZAS3 on $NF{\kappa}B$ activity is mediated by neither direct association with $NF{\kappa}B$ nor disrupting nuclear localization of $NF{\kappa}B$. Instead, ZAS3 repressed the expression of two key anti-apoptotic genes of $NF{\kappa}B$, TRAF1 and TRAF2, thereby sensitizing cells to $TNF{\alpha}$-induced cell death. Taken together, our data suggest that ZAS3 is a tumor suppressor gene and therefore serves as a novel therapeutic target for developing anti-cancer drugs.

Induction Motor Bearing Damage Detection Using Stator Current Monitoring (고정자전류 모니터링에 의한 유도전동기 베어링고장 검출에 관한 연구)

  • Yoon, Chung-Sup;Hong, Won-Pyo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.6
    • /
    • pp.36-45
    • /
    • 2005
  • This paper addresses the application of motor current spectral analysis for the detection of rolling-element bearing damage in induction machines. We set the experimental test bed. They is composed of the normal condition bearing system, the abnormal rolling-element bearing system of 2 type induction motors with shaft deflection system by external force and a hole drilled through the outer race of the shaft end bearing of the four pole test motor. We have developed the embedded distributed fault tolerant and fault diagnosis system for industrial motor. These mechanisms are based on two 32-bit DSPs and each TMS320F2407 DSP module is checking stator current The effects on the stator current spectrum are described and related frequencies are also determined. This is an important result in the formulation of a fault detection scheme that monitors the stator currents. We utilized the FFT(Fast Fourier Transform), Wavelet analysis and averaging signal pattern by inner product tool to analyze stator current components. Especially, the analyzed results by inner product clearly illustrate that the stator signature analysis can be used to identify the presence of a bearing fault.

An Authentication Protocol for Fast Soft Handover in Portable Internet (휴대인터넷에서 고속 소프트 핸드오버를 위한 인증 프로토콜)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1786-1795
    • /
    • 2006
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication. and can provide the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2 protocol for authorization and key exchange between a MSS and a BS. This paper proposes a new protocol based on PKMv2, which can provide that MSS is able to do fast authorization with a new BS when soft handover is occurred in a MSS. Our protocol can carry out fast authorization because of reducing the number of messages and parameter exchange, public key encryption and signature in wireless network more than the previous works. It also prevents eavesdropping from an external attacker and keeps the security against impersonation attacks for both a MSS and a BS.

Perfect Interference Alignment for K-user MIMO X Network (K-사용자 X 네트워크에서 다중안테나를 이용한 완전 간섭정렬기법)

  • Park, Seong-Ho;Park, Ki-Hong;Kim, Myeong-Jin;Ko, Young-Chai
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.24 no.2
    • /
    • pp.95-101
    • /
    • 2011
  • In wireless X networks where all transmitters send the independent messages to all receivers, the theoretical bound on the degrees of freedom (DOF) and interference alignment (IA) scheme for its achievability are given by Cadambe and Jafar [1]. However, IA scheme for wireless X network may be infeasible in practice unless the transmitters have the perfect channel information. In addition, if the transmitter with single antenna uses time-varying channel coefficients as a beamforming vector, the infinite channel extension is required to achieve the theoretical bound on the DOF of wireless X networks with perfect IA scheme. In this paper, we consider K-user MIMO X network where K transmitters and K receivers have M antennas each. While the beamforming vectors have been constructed with multiple channel uses over multiple time slot in the earlier work, we consider the beamforming vectors constructed only by a spatial signature over unit time. Accordingly the channel information at the transmitters can be available instantaneously. Then we propose the perfect IA scheme with no channel extension. Based on our sum-rate analysis and the simulation results, we confirm that our proposed scheme can achieve MK/2 DOF which is quite close to the theoretical bound on the DOF region of wireless X networks.

Design and Implementation of Malicious URL Prediction System based on Multiple Machine Learning Algorithms (다중 머신러닝 알고리즘을 이용한 악성 URL 예측 시스템 설계 및 구현)

  • Kang, Hong Koo;Shin, Sam Shin;Kim, Dae Yeob;Park, Soon Tai
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.11
    • /
    • pp.1396-1405
    • /
    • 2020
  • Cyber threats such as forced personal information collection and distribution of malicious codes using malicious URLs continue to occur. In order to cope with such cyber threats, a security technologies that quickly detects malicious URLs and prevents damage are required. In a web environment, malicious URLs have various forms and are created and deleted from time to time, so there is a limit to the response as a method of detecting or filtering by signature matching. Recently, researches on detecting and predicting malicious URLs using machine learning techniques have been actively conducted. Existing studies have proposed various features and machine learning algorithms for predicting malicious URLs, but most of them are only suggesting specialized algorithms by supplementing features and preprocessing, so it is difficult to sufficiently reflect the strengths of various machine learning algorithms. In this paper, a system for predicting malicious URLs using multiple machine learning algorithms was proposed, and an experiment was performed to combine the prediction results of multiple machine learning models to increase the accuracy of predicting malicious URLs. Through experiments, it was proved that the combination of multiple models is useful in improving the prediction performance compared to a single model.

Modal identification and model updating of a reinforced concrete bridge

  • El-Borgi, S.;Choura, S.;Ventura, C.;Baccouch, M.;Cherif, F.
    • Smart Structures and Systems
    • /
    • v.1 no.1
    • /
    • pp.83-101
    • /
    • 2005
  • This paper summarizes the application of a rational methodology for the structural assessment of older reinforced concrete Tunisian bridges. This methodology is based on ambient vibration measurement of the bridge, identification of the structure's modal signature and finite element model updating. The selected case study is the Boujnah bridge of the Tunis-Msaken Highway. This bridge is made of a continuous four-span simply supported reinforced concrete slab without girders resting on elastomeric bearings at each support. Ambient vibration tests were conducted on the bridge using a data acquisition system with nine force-balance accelerometers placed at selected locations of the bridge. The Enhanced Frequency Domain Decomposition technique was applied to extract the dynamic characteristics of the bridge. The finite element model was updated in order to obtain a reasonable correlation between experimental and numerical modal properties. For the model updating part of the study, the parameters selected for the updating process include the concrete modulus of elasticity, the elastic bearing stiffness and the foundation spring stiffnesses. The primary objective of the paper is to demonstrate the use of the Enhanced Frequency Domain Decomposition technique combined with model updating to provide data that could be used to assess the structural condition of the selected bridge. The application of the proposed methodology led to a relatively faithful linear elastic model of the bridge in its present condition.