• Title/Summary/Keyword: String

Search Result 1,090, Processing Time 0.025 seconds

Key Establishment Mechanism for Clustered Sensor Networks Through Nodes' Location Estimation (노드 위치 예측을 통한 클러스터링 기반의 센서네트워크 키설정 메커니즘)

  • Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.165-172
    • /
    • 2010
  • Sensor network can be applied in many areas in our life, and security is very important in applying sensor network. For secure sensor communication, pairwise key establishment between sensor nodes is essential. In this paper, we cluster the network field in hexagonal shapes and preassign three different kinds of key information for each sensor according to its expected location. We adopt overlapped key string pool concept for our clustered network architecture and every node uses the part of sub-strings for setting up pairwise keys with all neighboring nodes in its own cluster and from different clusters according to respective position with small amount of information. Our proposal decreases the memory requirement and increases security level efficiently.

The design and implementation of automatic translation system for hangul's romanization (국어 로마자 표기 자동 변환 시스템 설계 및 구현)

  • 김홍섭
    • KSCI Review
    • /
    • v.2 no.1
    • /
    • pp.45-54
    • /
    • 1995
  • This study is, by assigning ASCII codes hardly used to Bandaljum(ˇ) and making the fonts of Korean-English character mode, to design the way of converting automatically a word, a sentence or a document of korean into phonetic letters by applying the algorismized phonological principles inputted as a letter string, even though a user do not konw the basic principles of the usage of Korean-to-Romanization notation rule. This is designed so that it may be possible to turn into a mechanical code with reference to the corresponding character in the table of Korean-to-Romanization notation rule that is the currently used standard proposition of the government. Consequently this program makes it user more convenient in the manipulations of special case words, the assistance of colorful-screen or pull-down, pop-up menu and the adoptation of utilizable mouse works for a user convienency. This program could be installed in a single diskette of 5.25"(2HD) and be made in C programming language to mplement various font, expansion or condense of font, alternative printing.ting.

  • PDF

String analysis for detection of injection flaw in Web applications (웹 응용프로그램의 삽입취약점 탐지를 위한 문자열분석)

  • Choi, Tae-Hyoung;Kim, Jung-Joon;Doh, Kyung-Goo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.149-153
    • /
    • 2007
  • One common type of web-application vulnerabilities is injection flaw, where an attacker exploits faulty application code instead of normal input. In order to be free from injection flaw, an application program should be written in such a way that every potentially bad input character is filtered out. This paper proposes a precise analysis that statically checks whether or not an input string variable may have the given set of characters at hotspot. The precision is accomplished by taking the semantics of condition into account in the analysis.

Countermeasures to the Vulnerability of the Keyboard Hardware (키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.187-194
    • /
    • 2008
  • This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

A network-biology approach for identification of key genes and pathways involved in malignant peritoneal mesothelioma

  • Mahfuz, A.M.U.B.;Zubair-Bin-Mahfuj, A.M.;Podder, Dibya Joti
    • Genomics & Informatics
    • /
    • v.19 no.2
    • /
    • pp.16.1-16.14
    • /
    • 2021
  • Even in the current age of advanced medicine, the prognosis of malignant peritoneal mesothelioma (MPM) remains abysmal. Molecular mechanisms responsible for the initiation and progression of MPM are still largely not understood. Adopting an integrated bioinformatics approach, this study aims to identify the key genes and pathways responsible for MPM. Genes that are differentially expressed in MPM in comparison with the peritoneum of healthy controls have been identified by analyzing a microarray gene expression dataset. Gene Ontology and Kyoto Encyclopedia of Genes and Genomes pathway analyses of these differentially expressed genes (DEG) were conducted to gain a better insight. A protein-protein interaction (PPI) network of the proteins encoded by the DEGs was constructed using STRING and hub genes were detected analyzing this network. Next, the transcription factors and miRNAs that have possible regulatory roles on the hub genes were detected. Finally, survival analyses based on the hub genes were conducted using the GEPIA2 web server. Six hundred six genes were found to be differentially expressed in MPM; 133 are upregulated and 473 are downregulated. Analyzing the STRING generated PPI network, six dense modules and 12 hub genes were identified. Fifteen transcription factors and 10 miRNAs were identified to have the most extensive regulatory functions on the DEGs. Through bioinformatics analyses, this work provides an insight into the potential genes and pathways involved in MPM.

Fabrication of Lightweight Flexible c-Si Shingled Photovoltaic Modules for Building-Applied Photovoltaics (건물 부착형 고경량 유연성 슁글드 태양광 모듈)

  • Minseob, Kim;Min-Joon, Park;Jinho, Shin;Eunbi, Lee;Chaehwan, Jeong
    • Current Photovoltaic Research
    • /
    • v.10 no.4
    • /
    • pp.107-110
    • /
    • 2022
  • Lightweight and flexible photovoltaic (PV) modules are attractive for building-integrated photovoltaic (BIPV) applications because of their easy construction and applicability. In this study, we fabricated lightweight and flexible c-Si PV modules using ethylene tetrafluoroethylene (ETFE) front cover and shingled design string cells. The ETFE front cover instead of glass made the PV modules lighter in weight, and the shingled design string cells increased the flexibility. Finally, we fabricated a PV module with a conversion power of 240.08 W at an area of 1.25 m2 and weighed only 2 kg/m2. Moreover, to check the PV module's flexibility, we conducted a bending test. The difference of conversion power between the modules before and after bending shown was only 1.7 W, which showed a power reduction rate of about 0.7%.

Fabrication of Shingled Design Solar Module with Controllable Horizontal and Vertical Width (가로세로 폭의 제어가 가능한 슁글드 디자인 태양광 모듈 제조)

  • Min-Joon Park;Minseob Kim;Eunbi Lee;Yu-Jin Kim;Chaehwan Jeong
    • Current Photovoltaic Research
    • /
    • v.11 no.3
    • /
    • pp.75-78
    • /
    • 2023
  • Recently, the installation of photovoltaic modules in urban areas has been increasing. In particular, the demand for solar modules installed in a limited space is increasing. However, since the crystalline silicon solar module's size is proportional to the solar cell's size, it is difficult to manufacture a module that can be installed in a limited area. In this study, we fabricated a solar module with a shingled design that can control horizontal and vertical width using a bi-directional laser scribing method. We fabricated a string cell with a width of 1/5 compared to the existing shingled design string cells using a bi-directional laser scribing method, and we fabricated a solar module by connecting three strings in parallel. Finally, we achieved a conversion power of 5.521 W at a 103 mm × 320 mm area.

Force monitoring of Galfan cables in a long-span cable-truss string-support system based on the magnetic flux method

  • Yuxin Zhang;Xiang Tian;Juwei Xia;Hexin Zhang
    • Structural Monitoring and Maintenance
    • /
    • v.10 no.3
    • /
    • pp.261-281
    • /
    • 2023
  • Magnetic flux sensors are commonly used in monitoring the cable force, but the application of the sensors in large diameter non-closed Galfan cables, as those adopted in Yueqing Gymnasium which is located in Yueqing City, Zhejiang Province, China and is the largest span hybrid space structure in the world, is seldom done in engineering. Based on the construction of Yueqing Gymnasium, this paper studies the cable tension monitoring using the magnetic flux method across two stages, namely, the pre-calibration stage before the cable leaves the rigging factory and the field tension formation stage of the cable system. In the pre-calibration stage in the cable factory, a series of 1:1 full-scale comparative tests were carried out to study the feasibility and relability of this kind of monitoring method, and the influence on the monitoring results of charging and discharging voltage, sensor location, cable diameter and fitting method were also studied. Some meaningful conclusions were obtained. On this basis, the real-time cable tension monitoring system of the structure based on the magnetic flux method is established. During the construction process, the monitoring results of the cables are in good agreement with the data of the on-site pressure gauge.The work of this paper will provide a useful reference for cable force monitoring in the construction process of long-span spatial structures.

Failure analysis of damaged tungsten monoblock components of upper divertor outer target in EAST fusion device

  • Kang Wang;Ya Xi;Xiang Zan;Dahuan Zhu;Laima Luo;Rui Ding;Yucheng Wu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2307-2316
    • /
    • 2024
  • A melting failure of W monoblock components of the upper divertor outer target in EAST occurred during the plasma campaigns in 2019. The failure characters and microstructure evolution of the failed W monoblock have been well investigated on one string (W436 string). Near the strike point region where heat flux density is highest, macroscopic cracks and severe surface damage such as dimensional change, melting and solidification are visible in several W monoblocks. At the same time, debonding, melting and migration of Cu/CuCrZr cooling tube components introduced fatal damage to the structure and function. The heat-induced microstructure evolution in the rest part has been examined via hardness tests and metallography. From the heat flux surface to the cooling tube, hardness increased gradually and the recrystallized grains could be found in the region with the highest temperature, while recrystallization grains also appear in some W monoblocks near the cooling tube area. The detailed microstructure has been investigated by metallography and EBSD. Such cases in EAST provide experiences on the extreme condition of accidental loss of coolant or higher discharge power in future devices.