• Title/Summary/Keyword: key for identification

Search Result 930, Processing Time 0.027 seconds

Identification of flutter derivatives of bridge decks using stochastic search technique

  • Chen, Ai-Rong;Xu, Fu-You;Ma, Ru-Jin
    • Wind and Structures
    • /
    • v.9 no.6
    • /
    • pp.441-455
    • /
    • 2006
  • A more applicable optimization model for extracting flutter derivatives of bridge decks is presented, which is suitable for time-varying weights for fitting errors and different lengths of vertical bending and torsional free vibration data. A stochastic search technique for searching the optimal solution of optimization problem is developed, which is more convenient in understanding and programming than the alternate iteration technique, and testified to be a valid and efficient method using two numerical examples. On the basis of the section model test of Sutong Bridge deck, the flutter derivatives are extracted by the stochastic search technique, and compared with the identification results using the modified least-square method. The Empirical Mode Decomposition method is employed to eliminate noise, trends and zero excursion of the collected free vibration data of vertical bending and torsional motion, by which the identification precision of flutter derivatives is improved.

Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature (그룹 서명 기반의 차량 네트워크에서 상호 신분 확인 및 세션키 교환 기법)

  • Kim, Dai-Hoon;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Structural damage identification using an iterative two-stage method combining a modal energy based index with the BAS algorithm

  • Wang, Shuqing;Jiang, Yufeng;Xu, Mingqiang;Li, Yingchao;Li, Zhixiong
    • Steel and Composite Structures
    • /
    • v.36 no.1
    • /
    • pp.31-45
    • /
    • 2020
  • The purpose of this study is to develop an effective iterative two-stage method (ITSM) for structural damage identification of offshore platform structures. In each iteration, a new damage index, Modal Energy-Based Damage Index (MEBI), is proposed to help effectively locate the potential damage elements in the first stage. Then, in the second stage, the beetle antenna search (BAS) algorithm is used to estimate the damage severity of these elements. Compared with the well-known particle swarm optimization (PSO) algorithm and genetic algorithm (GA), this algorithm has lower computational cost. A modal energy based objective function for the optimization process is proposed. Using numerical and experimental data, the efficiency and accuracy of the ITSM are studied. The effects of measurement noise and spatial incompleteness of mode shape are both considered. All the obtained results show that under these influences, the ITSM can accurately identify the true location and severity of damage. The results also show that the objective function based on modal energy is most suitable for the ITSM compared with that based on flexibility and weighted natural frequency-mode shape.

A Method to Enhance the Security of ZKIP with Weak Keys and Its Application (약한 키를 가지는 대화식 영지식 증명의 안전성 강화 방법과 그 응용)

  • 양대헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.33-42
    • /
    • 2002
  • We present a systematic way to armor a zero-knowledge interactive proof based identification scheme that has badly chosen keys. Keys are sometimes mistakenly chosen to be weak(neither random nor long), and a weak key is often preferred to a strong key so that it might be easy for human to remember. Weak keys severely degrade the security of ZKIP based identification schemes. We show using off-line guessing attack how the weak key threats the security of ZlKIP based identification schemes. For the proper usage of ZKIP, we introduce a specialized form of ZKIP, which has a secret coin-tossing stage. Using the secret coin tossing, a secure framework is proposed for ZKIP based identification schemes with weak key in the ideal cipher model. The framework is very useful in password based authentication and key exchange protocol

The Design of Security Protocol for An Efficient Distribution and Renewal Method of Group Key (효율적인 그룹키 분배 및 갱신을 위한 보안 프로토콜의 설계)

  • O, Myeong-Uk;Kim, Seong-Yeol;Bae, Yong-Geun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.331-336
    • /
    • 2002
  • In this paper, we propose a new distribution and renewal scheme for a group key suitable for secure mobile communications based on identification protocol, in which all members of the group can reshare the new group common key except revoked members by using a key distribution center (a trusted center). The security of this scheme is based on the difficulty of the discrete logarithm problem. The proposed scheme can be appropriately managed in case that terminal's capability of storage and computing power is relatively small and more than one caller are revoked. It also renews a group key easily when the center changes this key intervally for security.

Experimental axial force identification based on modified Timoshenko beam theory

  • Li, Dong-sheng;Yuan, Yong-qiang;Li, Kun-peng;Li, Hong-nan
    • Structural Monitoring and Maintenance
    • /
    • v.4 no.2
    • /
    • pp.153-173
    • /
    • 2017
  • An improved method is presented to estimate the axial force of a bar member with vibrational measurements based on modified Timoshenko beam theory. Bending stiffness effects, rotational inertia, shear deformation, rotational inertia caused by shear deformation are all taken into account. Axial forces are estimated with certain natural frequency and corresponding mode shape, which are acquired from dynamic tests with five accelerometers. In the paper, modified Timoshenko beam theory is first presented with the inclusion of axial force and rotational inertia effects. Consistent mass and stiffness matrices for the modified Timoshenko beam theory are derived and then used in finite element simulations to investigate force identification accuracy under different boundary conditions and the influence of critical axial force ratio. The deformation coefficient which accounts for rotational inertia effects of the shearing deformation is discussed, and the relationship between the changing wave speed and the frequency is comprehensively examined to improve accuracy of the deformation coefficient. Finally, dynamic tests are conducted in our laboratory to identify progressive axial forces of a steel plate and a truss structure respectively. And the axial forces identified by the proposed method are in good agreement with the forces measured by FBG sensors and strain gauges. A significant advantage of this axial force identification method is that no assumption on boundary conditions is needed and excellent force identification accuracy can be achieved.

A new conjugate gradient method for dynamic load identification of airfoil structure with randomness

  • Lin J. Wang;Jia H. Li;You X. Xie
    • Structural Engineering and Mechanics
    • /
    • v.88 no.4
    • /
    • pp.301-309
    • /
    • 2023
  • In this paper, a new modified conjugate gradient (MCG) method is presented which is based on a new gradient regularizer, and this method is used to identify the dynamic load on airfoil structure without and with considering random structure parameters. First of all, the newly proposed algorithm is proved to be efficient and convergent through the rigorous mathematics theory and the numerical results of determinate dynamic load identification. Secondly, using the perturbation method, we transform uncertain inverse problem about force reconstruction into determinate load identification problem. Lastly, the statistical characteristics of identified load are evaluated by statistical methods. Especially, this newly proposed approach has successfully solved determinate and uncertain inverse problems about dynamic load identification. Numerical simulations validate that the newly developed method in this paper is feasible and stable in solving load identification problems without and with considering random structure parameters. Additionally, it also shows that most of the observation error of the proposed algorithm in solving dynamic load identification of deterministic and random structure is respectively within 11.13%, 20%.

Identification of Key Nodes in Microblog Networks

  • Lu, Jing;Wan, Wanggen
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.52-61
    • /
    • 2016
  • A microblog is a service typically offered by online social networks, such as Twitter and Facebook. From the perspective of information dissemination, we define the concept behind a spreading matrix. A new WeiboRank algorithm for identification of key nodes in microblog networks is proposed, taking into account parameters such as a user's direct appeal, a user's influence region, and a user's global influence power. To investigate how measures for ranking influential users in a network correlate, we compare the relative influence ranks of the top 20 microblog users of a university network. The proposed algorithm is compared with other algorithms - PageRank, Betweeness Centrality, Closeness Centrality, Out-degree - using a new tweets propagation model - the Ignorants-Spreaders-Rejecters model. Comparison results show that key nodes obtained from the WeiboRank algorithm have a wider transmission range and better influence.

A new conjugate gradient algorithm for solving dynamic load identification

  • Wang, Lin J.;Deng, Qi C.;Xie, You X.
    • Structural Engineering and Mechanics
    • /
    • v.64 no.2
    • /
    • pp.271-278
    • /
    • 2017
  • In this paper, we propose a new conjugate gradient method which possesses the global convergence and apply it to solve inverse problems of the dynamic loads identification. Moreover, we strictly prove the stability and convergence of the proposed method. Two engineering numerical examples are presented to demonstrate the effectiveness and speediness of the present method which is superior to the Landweber iteration method. The results of numerical simulations indicate that the proposed method is stable and effective in solving the multi-source dynamic loads identification problems of practical engineering.