• Title/Summary/Keyword: Source signatures

Search Result 48, Processing Time 0.035 seconds

Calibrating Electrode Misplacement in Underwater Electric Field Sensor Arrays for the Electric Field-Based Localization of Underwater Vessels (수중 이동체의 전기장 신호 기반 위치추정을 위한 수중 전기장 배열센서의 전극 부설 위치 오차 보정 방법)

  • Kim, Jason;Lee Ingyu;Bae, Ki-Woong;Yu, Son-Cheol
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.5
    • /
    • pp.330-336
    • /
    • 2022
  • This paper proposes a method to calibrate the electrode misplacement in underwater electric field sensor arrays (EFSAs) for accurate measurements of underwater electric field signatures. The electrode misplacement of an EFSA was estimated by measuring the electric field signatures generated by a known electric source and by comparing the measurements with the theoretical calculations under similar measurement conditions. When the EFSA measured the electric field signatures induced by an unknown electric source, the electric properties of the unknown electric source were approximated by considering the optimized estimation of the electrode misplacement of the EFSA. Finally, the measured electric field signatures were calibrated by calculating the theoretical electric field signatures to be measured with an ideally installed EFSA without electrode misplacement; the approximated electric properties of the unknown electric source were also taken into account. Simulations were conducted to test the proposed calibration method. The results showed that the electrode misplacement could be estimated. Further, the electric field measurements and the electric field-based localization of underwater vessels became more accurate after the application of the proposed calibration method. The proposed method will contribute to applications such as the detection and localization of underwater electric sources, which require accurate measurements of underwater electric field signatures.

SplitScreen: Enabling Efficient, Distributed Malware Detection

  • Cha, Sang-Kil;Moraru, Iulian;Jang, Ji-Yong;Truelove, John;Brumley, David;Andersen, David G.
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.187-200
    • /
    • 2011
  • We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifiesmalware signatures that are not of interest (99%). The screening step significantly improves end-to-end performance because safe files are quickly identified and are not processed further, and malware files can subsequently be scanned using only the signatures that are necessary. Our approach naturally leads to a network-based anti-malware solution in which clients only receive signatures they needed, not every malware signature ever created as with current approaches. We have implemented SplitScreen as an extension to ClamAV, the most popular open source anti-malware software. For the current number of signatures, our implementation is $2{\times}$ faster and requires $2{\times}$ less memory than the original ClamAV. These gaps widen as the number of signatures grows.

Use of Magnesium Stable Isotope Signatures for the Petrogenetic Interpretation of Granitic Rocks (화강암류의 성인 해석에 대한 마그네슘 동위원소 자료의 활용)

  • Cheong, Chang-Sik;Ryu, Jong-Sik
    • The Journal of the Petrological Society of Korea
    • /
    • v.23 no.3
    • /
    • pp.221-227
    • /
    • 2014
  • With the advent of multi collector-inductively coupled plasma mass spectrometry, stable isotopic variations of non-traditional metal elements have provided important constraints on the sources of geologic materials. This review introduces the principles of magnesium isotopic fractionation and analytical methods. Recent case studies are also reviewed for the use of magnesium isotope signatures to decipher the source materials of I-, S-, and A-type granitoids in western North America, Australia, and China.

Tissue proteomics for cancer biomarker development - Laser microdissection and 2D-DIGE -

  • Kondo, Tadashi
    • BMB Reports
    • /
    • v.41 no.9
    • /
    • pp.626-634
    • /
    • 2008
  • Novel cancer biomarkers are required to achieve early diagnosis and optimized therapy for individual patients. Cancer is a disease of the genome, and tumor tissues are a rich source of cancer biomarkers as they contain the functional translation of the genome, namely the proteome. Investigation of the tumor tissue proteome allows the identification of proteomic signatures corresponding to clinico-pathological parameters, and individual proteins in such signatures will be good biomarker candidates. Tumor tissues are also a rich source for plasma biomarkers, because proteins released from tumor tissues may be more cancer specific than those from non-tumor cells. Two-dimensional difference gel electrophoresis (2D-DIGE) with novel ultra high sensitive fluorescent dyes (CyDye DIGE Fluor satulation dye) enables the efficient protein expression profiling of laser-microdissected tissue samples. The combined use of laser microdissection allows accurate proteomic profiling of specific cells in tumor tissues. To develop clinical applications using the identified biomarkers, collaboration between research scientists, clinicians and diagnostic companies is essential, particularly in the early phases of the biomarker development projects. The proteomics modalities currently available have the potential to lead to the development of clinical applications, and channeling the wealth of produced information towards concrete and specific clinical purposes is urgent.

Analysis of Storage and Retrieval Results of Audio Sources and Signatures using Blockchain and Distributed Storage System

  • Lee, Kyoung-Sik;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.7
    • /
    • pp.1228-1236
    • /
    • 2019
  • Recently, media platforms such as YouTube and Twitch provide services that can generate personal revenue by utilizing media content produced by individuals. In this regard, interest in the copyright of media content is increasing. In particular, in the case of an audio source, competition for securing audio source copyright is fierce because it is an essential element for almost all media content production. In this paper, we propose a method to store the audio source and its signature using a blockchain and distributed storage system to verify the copyright of music content. To identify the possibility of extracting the audio signature of the audio source and to include it as blockchain transaction data, we implement the audio source and its signature file upload system based on the proposed scheme. In addition, we show the effectiveness of the proposed method through experiments on uploading and retrieving audio files and identify future improvements.

SIMULATED IMPACTS TO NON-MAGNETIC CATACLYSMIC VARIABLE DISKS

  • MONTGOMERY, M.M.;HOWELL, N.;SCHWARZ, C.
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.179-182
    • /
    • 2015
  • Dust has recently been found to be prevalent in compact binaries such as non-magnetic Cataclysmic Variable systems. As a possible source of this dust is from solid bodies, we explore impacts to non-magnetic Cataclysmic Variable disks. We use three-dimensional Smoothed Particle Hydrodynamic simulations to search for impact signatures. From injections of whole bodies to these disks, we find pulse shapes in simulated bolometric light curves that resemble impact flashes in the light curves of the Shoemaker-Levy 9 event. As a result, we tentatively identify these light curve shapes as signatures of impacts.

Effect of Different Misfired Source on Seismic Survey Quality (불발 음원이 탄성파탐사 성능에 미치는 영향)

  • 유해수;장재경;양승진
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.7
    • /
    • pp.75-79
    • /
    • 1999
  • The beam patterns of source array and changes in the far-field signatures are compared and analyzed each other in order to identify the seismic capability affected by the misfired source at the multi-channel seismic source array. In the primary pulse amplitude of far-field signature, the 66% of seismic capacity are sustained if approximately 40% of source are misfired among whole gun volume. When the sources with the same distances are misfired at the 154㎐, the beam width of the long- and wide-array which is identical regardless of arraying pattern. The beam width has a tendency to narrow now from 41 to 34 according to increase the volume of misfired source at the long-array beam pattern. Therefore, the source array of small volume are suitable for the shallow seismic survey because of producing adequate beam patterns with narrow beam width.

  • PDF

The Scanning Laser Source Technique for Detection of Surface-Breaking and Subsurface Defect

  • Sohn, Young-Hoon;Krishnaswamy, Sridhar
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.27 no.3
    • /
    • pp.246-254
    • /
    • 2007
  • The scanning laser source (SLS) technique is a promising new laser ultrasonic tool for the detection of small surface-breaking defects. The SLS approach is based on monitoring the changes in laser-generated ultrasound as a laser source is scanned over a defect. Changes in amplitude and frequency content are observed for ultrasound generated by the laser over uniform and defective areas. The SLS technique uses a point or a short line-focused high-power laser beam which is swept across the test specimen surface and passes over surface-breaking or subsurface flaws. The ultrasonic signal that arrives at the Rayleigh wave speed is monitored as the SLS is scanned. It is found that the amplitude and frequency of the measured ultrasonic signal have specific variations when the laser source approaches, passes over and moves behind the defect. In this paper, the setup for SLS experiments with full B-scan capability is described and SLS signatures from small surface-breaking and subsurface flaws are discussed using a point or short line focused laser source.

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof (결함 있는 안전성 증명을 갖는 수신자 지정 서명기법들에 대한 정확한 안전성분석)

  • Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.37-48
    • /
    • 2010
  • Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.

Deep Packet Inspection Time-Aware Load Balancer on Many-Core Processors for Fast Intrusion Detection

  • Choi, Yoon-Ho;Park, Woojin;Choi, Seok-Hwan;Seo, Seung-Woo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.169-177
    • /
    • 2016
  • To realize high-speed intrusion detection by accommodating many regular expression (regex)-based signatures and growing network link capacities, we propose the Service TimE-Aware Load-balancing (STEAL) algorithm. This work is motivated from the observation that utilization of a many-core network intrusion detection system (NIDS) is influenced by unfair computational distribution among many-core NIDS nodes. To avoid such unfair computational distribution, STEAL is designed to dynamically distribute a large volume of traffic among many-core NIDS nodes based on packet service time, which is represented by the deep packet time in many-core NIDS nodes. From experiments, we show that compared to the commonly used load-balancing algorithm based on arrival rate, STEAL increases the number of received packets (i.e., decreases the number of dropped packets) in many-core NIDS. Specifically, by integrating an open source NIDS (i.e. Bro) with STEAL, we show that even under attack-dominant traffic and with many signatures, STEAL can rapidly improve the performance of many-core NIDS to realize high-speed intrusion detection.