• Title/Summary/Keyword: key for identification

Search Result 930, Processing Time 0.024 seconds

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

A novel WOA-based structural damage identification using weighted modal data and flexibility assurance criterion

  • Chen, Zexiang;Yu, Ling
    • Structural Engineering and Mechanics
    • /
    • v.75 no.4
    • /
    • pp.445-454
    • /
    • 2020
  • Structural damage identification (SDI) is a crucial step in structural health monitoring. However, some of the existing SDI methods cannot provide enough identification accuracy and efficiency in practice. A novel whale optimization algorithm (WOA) based method is proposed for SDI by weighting modal data and flexibility assurance criterion in this study. At first, the SDI problem is mathematically converted into a constrained optimization problem. Unlike traditional objective function defined using frequencies and mode shapes, a new objective function on the SDI problem is formulated by weighting both modal data and flexibility assurance criterion. Then, the WOA method, due to its good performance of fast convergence and global searching ability, is adopted to provide an accurate solution to the SDI problem, different predator mechanisms are formulated and their probability thresholds are selected. Finally, the performance of the proposed method is assessed by numerical simulations on a simply-supported beam and a 31-bar truss structures. For the given multiple structural damage conditions under environmental noises, the WOA-based SDI method can effectively locate structural damages and accurately estimate severities of damages. Compared with other optimization methods, such as particle swarm optimization and dragonfly algorithm, the proposed WOA-based method outperforms in accuracy and efficiency, which can provide a more effective and potential tool for the SDI problem.

Identification of Root Age by Histochemical Staining of Secretory Duct Layers in Ginseng (인삼 분비도관의 조직화학적 염색에 의한 연근판별)

  • 이경환;이성식;이명구;김은수
    • Journal of Ginseng Research
    • /
    • v.25 no.2
    • /
    • pp.101-105
    • /
    • 2001
  • Identification of the age of ginseng root is very important in commercial market as well as in research field. However, any criterion abut it has not been clearly established yet. We studied to find a clear morphological key for identification of ginseng root\\`s age using the histochemical staining method. Fresh sections of 3, 4, 5, and 6 year old roots were stained with 1% nile blue, observed under the light microscopy, and compared each other. The number of secretory duct layers(SDL) is a useful key to confirm the age of ginseng root as follow; three-year-old root has two, four-year-old one has three, fie-year-old one has four, and six-year-old one has five resin duct layers on each cortical region of roots. Secretory ducts are thought to be formed by the vascular cambium every year. Unlike the surrounding parenchyma cells, secretory epithelial cells lack starch grains in the cytoplasm.

  • PDF

Multiple damages detection in beam based approximate waveform capacity dimension

  • Yang, Zhibo;Chen, Xuefeng;Tian, Shaohua;He, Zhengjia
    • Structural Engineering and Mechanics
    • /
    • v.41 no.5
    • /
    • pp.663-673
    • /
    • 2012
  • A number of mode shape-based structure damage identification methods have been verified by numerical simulations or experiments for on-line structure health monitoring (SHM). However, many of them need a baseline mode shape generated by the healthy structure serving as a reference to identify damages. Otherwise these methods can hardly perform well when multiple cracks conditions occur. So it is important to solve the problems above. By aid of the fractal dimension method (FD), Qiao and Wang proposed a generalized fractal dimension (GFD) to detect the delamination damage. As a modification of GFD, Qiao and Cao proposed the approximate waveform capacity dimension (AWCD) technique to simplify the calculation of fractal and overcome the false peak appearing in the high mode shapes. Based on their valued work, this paper combined and applied the AWCD method and curvature mode shape data to detect multiple damages in beam. In the end, the identification properties of the AWCD for multiple damages have been verified by groups of Monte Carlo simulations and experiments.

Target identification for visual tracking

  • Lee, Joon-Woong;Yun, Joo-Seop;Kweon, In-So
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10a
    • /
    • pp.145-148
    • /
    • 1996
  • In moving object tracking based on the visual sensory feedback, a prerequisite is to determine which feature or which object is to be tracked and then the feature or the object identification precedes the tracking. In this paper, we focus on the object identification not image feature identification. The target identification is realized by finding out corresponding line segments to the hypothesized model segments of the target. The key idea is the combination of the Mahalanobis distance with the geometrica relationship between model segments and extracted line segments. We demonstrate the robustness and feasibility of the proposed target identification algorithm by a moving vehicle identification and tracking in the video traffic surveillance system over images of a road scene.

  • PDF

Automatic Identification of Business Services Using EA Ontology (EA 온톨로지 기반 비즈니스 서비스 자동 식별방안)

  • Jeong, Chan-Ki;Hwang, Sang-Kyu
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.179-191
    • /
    • 2010
  • Service identification and composition is one of the key characteristics for a successful Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. In the Service-Oriented Analysis, the identification of business services has to be preceded before application services are identified. Most approaches addressing the derivation of business services are based on heuristic methods and human experts. The manual identification of business services is highly expensive and ambiguous task, and it may result in the service design with bad quality because of errors and misconception. Although a few of approaches of automatic service identification are proposed, most of them are in focus on technical architectures and application services. In this paper, we propose a model on the automatic identification of business services by horizontal and vertical service alignment using Enterprise Architecture as an ontology. We verify the effectiveness of the proposed model of business services identification through a case study based on Department of Defense Enterprise Architecture.

Structural modal identification through ensemble empirical modal decomposition

  • Zhang, J.;Yan, R.Q.;Yang, C.Q.
    • Smart Structures and Systems
    • /
    • v.11 no.1
    • /
    • pp.123-134
    • /
    • 2013
  • Identifying structural modal parameters, especially those modes within high frequency range, from ambient data is still a challenging problem due to various kinds of uncertainty involved in vibration measurements. A procedure applying an ensemble empirical mode decomposition (EEMD) method is proposed for accurate and robust structural modal identification. In the proposed method, the EEMD process is first implemented to decompose the original ambient data to a set of intrinsic mode functions (IMFs), which are zero-mean time series with energy in narrow frequency bands. Subsequently, a Sub-PolyMAX method is performed in narrow frequency bands by using IMFs as primary data for structural modal identification. The merit of the proposed method is that it performs structural identification in narrow frequency bands (take IMFs as primary data), unlike the traditional method in the whole frequency space (take original measurements as primary data), thus it produces more accurate identification results. A numerical example and a multiple-span continuous steel bridge have been investigated to verify the effectiveness of the proposed method.

Adaptation and Clustering Method for Speaker Identification with Small Training Data (화자적응과 군집화를 이용한 화자식별 시스템의 성능 및 속도 향상)

  • Kim Se-Hyun;Oh Yung-Hwan
    • MALSORI
    • /
    • no.58
    • /
    • pp.83-99
    • /
    • 2006
  • One key factor that hinders the widespread deployment of speaker identification technologies is the requirement of long enrollment utterances to guarantee low error rate during identification. To gain user acceptance of speaker identification technologies, adaptation algorithms that can enroll speakers with short utterances are highly essential. To this end, this paper applies MLLR speaker adaptation for speaker enrollment and compares its performance against other speaker modeling techniques: GMMs and HMM. Also, to speed up the computational procedure of identification, we apply speaker clustering method which uses principal component analysis (PCA) and weighted Euclidean distance as distance measurement. Experimental results show that MLLR adapted modeling method is most effective for short enrollment utterances and that the GMMs performs better when long utterances are available.

  • PDF

Probabilistic-based damage identification based on error functions with an autofocusing feature

  • Gorgin, Rahim;Ma, Yunlong;Wu, Zhanjun;Gao, Dongyue;Wang, Yishou
    • Smart Structures and Systems
    • /
    • v.15 no.4
    • /
    • pp.1121-1137
    • /
    • 2015
  • This study presents probabilistic-based damage identification technique for highlighting damage in metallic structures. This technique utilizes distributed piezoelectric transducers to generate and monitor the ultrasonic Lamb wave with narrowband frequency. Diagnostic signals were used to define the scatter signals of different paths. The energy of scatter signals till different times were calculated by taking root mean square of the scatter signals. For each pair of parallel paths an error function based on the energy of scatter signals is introduced. The resultant error function then is used to estimate the probability of the presence of damage in the monitoring area. The presented method with an autofocusing feature is applied to aluminum plates for method verification. The results identified using both simulation and experimental Lamb wave signals at different central frequencies agreed well with the actual situations, demonstrating the potential of the presented algorithm for identification of damage in metallic structures. An obvious merit of the presented technique is that in addition to damages located inside the region between transducers; those who are outside this region can also be monitored without any interpretation of signals. This novelty qualifies this method for online structural health monitoring.

A Network-based Optimization Model for Effective Target Selection (핵심 노드 선정을 위한 네트워크 기반 최적화 모델)

  • Jinho Lee;Kihyun Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.