• Title/Summary/Keyword: Unlocking Process

Search Result 9, Processing Time 0.024 seconds

A Preference of Smartphone Locking Algorithms Using Delphi and AHP (Aanalytic Hierarchy Process) (델파이와 계층분석기법을 이용한 스마트폰 잠금 알고리즘 선호도 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1228-1233
    • /
    • 2019
  • Recently, a variety of algorithms using encryption technology have been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve the unlocking problem through human biometrics technology, which has already succeeded in commercializing. These include finger print recognition, face recognition, and iris recognition. In this study, the evaluation items are five algorithms, including finger print recognition, face recognition, iris recognition, pattern recognition, and password input method. Based on the algorithms adopted, the AHP (analytic hierarchy process) technique was used to calculate the preferred priorities for smartphone users. Finger print recognition ( .400) was the top priority for smartphone users. Next, pattern recognition ( .237) was placed in the second priority for smartphone users. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.

Protector Design and Shock Analysis for a Launch-Reconnaissance Robot (발사형 정찰로봇을 위한 보호체 설계 및 충격해석)

  • Kang, Bong-Soo;Park, Moon-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.8
    • /
    • pp.971-976
    • /
    • 2011
  • This paper presents the design concepts of a protector for a launch-reconnaissance robot that is to be deployed for data-collection in hazardous regions. The protector protects the reconnaissance robot inside from shock induced during the process of launch, flight, and landing. Since the outer shells of the protector are automatically opened wide by the unlocking mechanism during the landing stage, the reconnaissance robot can easily exit the protector and move around to carry out its mission. We carefully simulated a finite-element model of the protector with the robot and compared the results with the actual dynamic behavior of the system. Shock- response tests using a droptable showed that the proposed protector filled with silicon material successfully attenuated external shock.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.

Advances towards Controlling Meiotic Recombination for Plant Breeding

  • Choi, Kyuha
    • Molecules and Cells
    • /
    • v.40 no.11
    • /
    • pp.814-822
    • /
    • 2017
  • Meiotic homologous recombination generates new combinations of preexisting genetic variation and is a crucial process in plant breeding. Within the last decade, our understanding of plant meiotic recombination and genome diversity has advanced considerably. Innovation in DNA sequencing technology has led to the exploration of high-resolution genetic and epigenetic information in plant genomes, which has helped to accelerate plant breeding practices via high-throughput genotyping, and linkage and association mapping. In addition, great advances toward understanding the genetic and epigenetic control mechanisms of meiotic recombination have enabled the expansion of breeding programs and the unlocking of genetic diversity that can be used for crop improvement. This review highlights the recent literature on plant meiotic recombination and discusses the translation of this knowledge to the manipulation of meiotic recombination frequency and location with regards to crop plant breeding.

The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process (스마트 폰 잠금 해제 과정에서의 감성적 UX 요소가 전반적 기기 사용 경험과 향후 사용 의도에 미치는 영향)

  • Lee, Sunhwa;Shin, Youngsoo;Im, Chaerin;Beak, Hannah;Lee, Sungho;Kim, Jinwoo
    • Science of Emotion and Sensibility
    • /
    • v.17 no.4
    • /
    • pp.79-88
    • /
    • 2014
  • Smart-phones have become a vital part of our lives, paying a bill online, shopping using applications, using email and office applications. Therefore, the risk of the leakage of personal informations and the misuse of them becomes high, for the cost of loosing smart-phone. Many types of smart-phone security features such as password, slide-lock, and pattern lock have been introduced. However, those security locks make users not to easily access and use a smart-phone. There is tradeoff between security on one hand, and usability and cost on the other. This paper propose Self-Concealment to solve the tradeoff problem and demonstrate the effect through the experiment. In sum, Self-Concealment lowers smart-phone experience; however increases smart-phone use intension. This paper has implication for proposing new User Experience (UX) construct to resolve the trade-off between security and usability.

Analysis of Preference for Encryption Algorithm Based on Decision Methodology (의사 결정 방법론을 기반한 암호화 알고리즘 선호도 분석)

  • Jin, Chan-Yong;Shin, Seong-Yoon;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.167-168
    • /
    • 2019
  • Lately, variety of algorithms using encryption technology has been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve through human biometrics technology which has already succeeded in commercialization. These include finger print recognition, face recognition, and iris recognition. In this study, we selected biometrics recognition technology and pattern recognition and password input methods which are already commercialized as evaluation items. The evaluation items are five algorithms including finger print recognition, face recognition iris recognition, pattern recognition and password input method. Based on these algorithms, analytic hierarchy process is used to analyze the preference of smartphone users. Also, the theoretical implications are presented based on the analysis results.

  • PDF

Quantified Lockscreen: Integration of Personalized Facial Expression Detection and Mobile Lockscreen application for Emotion Mining and Quantified Self (Quantified Lockscreen: 감정 마이닝과 자기정량화를 위한 개인화된 표정인식 및 모바일 잠금화면 통합 어플리케이션)

  • Kim, Sung Sil;Park, Junsoo;Woo, Woontack
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1459-1466
    • /
    • 2015
  • Lockscreen is one of the most frequently encountered interfaces by smartphone users. Although users perform unlocking actions every day, there are no benefits in using lockscreens apart from security and authentication purposes. In this paper, we replace the traditional lockscreen with an application that analyzes facial expressions in order to collect facial expression data and provide real-time feedback to users. To evaluate this concept, we have implemented Quantified Lockscreen application, supporting the following contributions of this paper: 1) an unobtrusive interface for collecting facial expression data and evaluating emotional patterns, 2) an improvement in accuracy of facial expression detection through a personalized machine learning process, and 3) an enhancement of the validity of emotion data through bidirectional, multi-channel and multi-input methodology.

Fatigue Analysis for Locking Device in Landing Gear Retract Actuator (착륙장치 작동기 내부 잠금장치 피로해석)

  • Lee, Jeong-Sun;Kang, Shin-Hyun;Jang, Woo-Chul;Lee, Seung-Gyu;Oh, Seong-Hwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • The retract actuator makes the landing gear retract or extend during take-off and landing of an aircraft. To prevent folding of landing gear that has remained in the extended state because of an unexpected external disturbance, an internal locking device is applied to the retract actuator. The locking device is restrained with another internal component by oil pressure supplied to the retract actuator, and this restraint makes the locking of the actuator possible. Because locking and unlocking are repeated during retraction and extension of the landing gear, the locking device takes repeated identical loads, and the possibility of fatigue failure exists. In this study, the process and results of fatigue analysis for the locking device are presented, and the appropriateness of the analysis result is verified using a fatigue test.

Unlocking the Therapeutic Potential of BCL-2 Associated Protein Family: Exploring BCL-2 Inhibitors in Cancer Therapy

  • Bisan El Dakkak;Jalal Taneera;Waseem El-Huneidi;Eman Abu-Gharbieh;Rifat Hamoudi;Mohammad H. Semreen;Nelson C. Soares;Eman Y. Abu-Rish;Mahmoud Y. Alkawareek;Alaaldin M. Alkilany;Yasser Bustanji
    • Biomolecules & Therapeutics
    • /
    • v.32 no.3
    • /
    • pp.267-280
    • /
    • 2024
  • Apoptosis, programmed cell death pathway, is a vital physiological mechanism that ensures cellular homeostasis and overall cellular well-being. In the context of cancer, where evasion of apoptosis is a hallmark, the overexpression of anti-apoptotic proteins like Bcl2, Bcl-xL and Mcl-1 has been documented. Consequently, these proteins have emerged as promising targets for therapeutic interventions. The BCL-2 protein family is central to apoptosis and plays a significant importance in determining cellular fate serving as a critical determinant in this biological process. This review offers a comprehensive exploration of the BCL-2 protein family, emphasizing its dual nature. Specifically, certain members of this family promote cell survival (known as anti-apoptotic proteins), while others are involved in facilitating cell death (referred to as pro-apoptotic and BH3-only proteins). The potential of directly targeting these proteins is examined, particularly due to their involvement in conferring resistance to traditional cancer therapies. The effectiveness of such targeting strategies is also discussed, considering the tumor's propensity for anti-apoptotic pathways. Furthermore, the review highlights emerging research on combination therapies, where BCL-2 inhibitors are used synergistically with other treatments to enhance therapeutic outcomes. By understanding and manipulating the BCL-2 family and its associated pathways, we open doors to innovative and more effective cancer treatments, offering hope for resistant and aggressive cases.