• Title/Summary/Keyword: key for identification

Search Result 930, Processing Time 0.031 seconds

Target Identification using the Mahalanobis Distance and Geometric Parameters (마할라노비스 거리와 기하학적 파라메터에 의한 표적의 인식)

  • 이준웅;권인소
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.7
    • /
    • pp.814-820
    • /
    • 1999
  • We propose a target identification algorithm for visual tracking. Target identification is realized by finding out corresponding line segments to the hypothesized model segments of the target. The key idea is the combination of the Mahalanobis distance with the geometrical relationship between model segments and extracted line segments.

  • PDF

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Parametric identification of a cable-stayed bridge using least square estimation with substructure approach

  • Huang, Hongwei;Yang, Yaohua;Sun, Limin
    • Smart Structures and Systems
    • /
    • v.15 no.2
    • /
    • pp.425-445
    • /
    • 2015
  • Parametric identification of structures is one of the important aspects of structural health monitoring. Most of the techniques available in the literature have been proved to be effective for structures with small degree of freedoms. However, the problem becomes challenging when the structure system is large, such as bridge structures. Therefore, it is highly desirable to develop parametric identification methods that are applicable to complex structures. In this paper, the LSE based techniques will be combined with the substructure approach for identifying the parameters of a cable-stayed bridge with large degree of freedoms. Numerical analysis has been carried out for substructures extracted from the 2-dimentional (2D) finite element model of a cable-stayed bridge. Only vertical white noise excitations are applied to the structure, and two different cases are considered where the structural damping is not included or included. Simulation results demonstrate that the proposed approach is capable of identifying the structural parameters with high accuracy without measurement noises.

First Report in Korea of the Stored Grain Pest Cynaeus angustus (LeConte) and a Pictorial Identification Key for Tenebrionid Pests in Stored Products (새로운 저장곡물해충 Cynaeus angustus (LeConte) 및 저장산물의 거저리과 해충에 대한 도해검색)

  • Hong, Ki-Jeong;Yun, Tae-Sung
    • Korean journal of applied entomology
    • /
    • v.56 no.2
    • /
    • pp.223-227
    • /
    • 2017
  • The larger black flour beetle, Cynaeus angustus (LeConte) (Diaperinae: Tenebrionidae) is reported for the first time in Korea. C. angustus is economically important as an insect pest in stored products in the Nearctic region, and has been identified in several rice mills in Korea. Taxonomic diagnosis and photographs presenting the morphology of adults and larvae are provided, along with a pictorial identification key to 17 tenebrionid pests detected during quarantine in stored products in Korea.

Identity-based key distribution system and conference key distribution system (ID-Based 키 분비방식 및 회의용 키 분배방식)

  • 손기욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.38-46
    • /
    • 1991
  • This paper pro poses a ley distribution system based on identification information. The system uses an indivdual user's identification instead of the public file used in the Diffie-Hellman sustem. It does not require any services of a center to distribute work keys and users to keep directory public file. We propose an identity-based key distribution system for generating a commom secret conference kdy for two or more users. We assume users are connected in a ring network. Message among users authenticated using each user's identification informa-tion. The security of the our proposed system is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.

Identification of Key beta-1,3-glucan Synthesis Enzymes in Agrobacterium sp. ATCC31750 (Agrobacterium sp. ATCC31750에 대한 beta-l,3-glucan 합성 대사경로의 주요 단백질 검출)

  • Kim Ryo Hwa;Lee Jung Heon
    • KSBB Journal
    • /
    • v.19 no.5
    • /
    • pp.406-409
    • /
    • 2004
  • Matrix Assisted Laser Desorption ionization Time of Flight (MALDI-TOF) was used for enzymes identification related to B -1,3-glucan synthesis. Agrobacterium sp. ATCC31750 was cultivated with two stage Continuous Stirrer Tank Reactor (CSTR) and the cells were harvested and their protein profiles were analysed by two dimensional electrophoresis. The specific enzyme spot was treated with trypsin and ana lysed by MALDI-TOF to get peptide molecular weight. The peptide molecular weights were matched with Agrobacterium tumefacience's Data Base from the matrix science site, then could identify the avaliable key enzymes. In this study, we identified key metabolite of synthesis of beta-1,3-glucan, such as glucose-6-phosphate isomerase, phosphoglucomutase, B-1,3-glucan synthase and glucokinase, and we also identified uracil phosphoribocyl transferase and Ribosome recycling factor also.

A Study for Establishing Key Performance Indicators of R&D Departments (연구개발 부문의 핵심성과지표 개발 사례연구)

  • Cho, Nam Wook;Kim, Tae-Sung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.4
    • /
    • pp.48-54
    • /
    • 2012
  • In this paper, quantitative and systematic procedures for establishing Key Performance Indicators (KPI's) of R&D departments are presented. The proposed methodology is composed of 4 steps : 1) identification of critical success factors, 2) identification of potential KPI's, 3) determination of KPI's and 4) monitoring and execution. A Strategy Map has been presented to better align KPI's with a company's competitive strategies. Also, Analytical Hierarchy Planning (AHP) is used to determine weights of KPI's and Data Envelopment Analysis (DEA) is used to analyze the effectiveness of R&D departments. To demonstrate its validity of the proposed method, it has been applied to the R&D divisions of a semiconductor company.

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

Development of a Hypertext-based Polychotomous Key for the Identification of Planthoppers Caught by Light Trap in Paddy Fields (논에 설치한 유아등에 채집되는 멸구류 동정을 위한 하이퍼텍스트 기반 검색표 개발)

  • 김황용;박창규;한만위;엄기백;우건석
    • Korean journal of applied entomology
    • /
    • v.41 no.2
    • /
    • pp.75-83
    • /
    • 2002
  • The hypertext-based polychotomous key in m (World Wide Web) was developed to improve the identification accuracy of planthoppers caught by the light trap in Korean paddy fields. The effects of it were tested by 12 students who are not familiar at the identification of insects. When they used the hypertext, it was improved that the ability of them to recognize Sogatella furcifera (Horvath) and Laodelphax striatellus (Fallen). Identification accuracy of the former was increased significantly from 56% to 83% and that of the latter was also increased significantly from 47% to 80%. However, many students still have difficulty in the recognition of Nilaparvata lugens (Stal).

Load and Mutual Inductance Identification Method for Series-Parallel Compensated IPT Systems

  • Chen, Long;Su, Yu-Gang;Zhao, Yu-Ming;Tang, Chun-Sen;Dai, Xin
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1545-1552
    • /
    • 2017
  • Identifying the load and mutual inductance is essential for improving the power transfer capability and power transfer efficiency of Inductive Power Transfer (IPT) systems. In this paper, a steady-state load and mutual inductance identification method focusing on series-parallel compensated IPT systems is proposed. The identification model is established according to the steady-state characteristics of the system. Furthermore, two sets of identification results are obtained, and then they are analyzed in detail to eliminate the untrue one. In addition, the identification method can be achieved without extra circuits so that it does not increase the complexity of the system or the control difficulty. Finally, the feasibility of the proposed method has been verified by simulation and experimental results.