• Title/Summary/Keyword: system identification

Search Result 5,890, Processing Time 0.04 seconds

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

Function identification of bovine Nramp1 promoter and intron 1

  • Hao, Linlin;Zhang, Libo;Li, Mingtang;Nan, Wang;Liu, Songcai;Zhong, Jifeng
    • Animal cells and systems
    • /
    • v.15 no.3
    • /
    • pp.227-233
    • /
    • 2011
  • The Nramp1/Slc11a1 locus encodes a proton-coupled divalent cation transporter, expressed in late endosomes/lysosomes of macrophages, that constitutes a component of the innate immune response to combat intracellular pathogens and it was shown to play an important role in regulating inherent immunity. The previously identified Z-DNA forming polymorphic repeat(GT)n in the promoter region of the human Nramp1 gene does act as a functional polymorphism influencing gene expression. Research has shown that INF-${\gamma}$, TNF-${\alpha}$, IL-$1{\beta}$ and bacteria LPS increase the level of Nramp1 expression. However, the molecular mechanism for Nramp1 gene regulation is unclear. In this research, bovine Nramp1 5'-flanking region (-1748~+769) was cloned and analyzed by bioinformatics. Then to find the core promoter and the cis-acting elements, deletion analysis of promoter was performed using a set of luciferase reporter gene constructs containing successive deletions of the bovine Nramp1 5'-flanking regions. Promoter activity analysis by the dual luciferase reporter assay system showed that the core promoter of Nramp1 was located at +58~-89 bp. Some positive regulatory elements are located at -89~-205 bp and -278~-1495 bp. And the repressor elements were in region -205~-278 bp, intron1 and -1495~-1748 bp. LPS-responsive regions were located at -1495~-1748 bp and -278~-205 bp. The present study provides an initial effort to explore the molecular mechanism of transcriptional activation of the bovine Nramp1 gene and should facilitate further studies to decode the complex regulatory process and for molecular breeding for disease resistance in bovines.

A strain-based wire breakage identification algorithm for unbonded PT tendons

  • Abdullah, A.B.M.;Rice, Jennifer A.;Hamilton, H.R.
    • Smart Structures and Systems
    • /
    • v.16 no.3
    • /
    • pp.415-433
    • /
    • 2015
  • Tendon failures in bonded post-tensioned bridges over the last two decades have motivated ongoing investigations on various aspects of unbonded tendons and their monitoring methods. Recent research shows that change of strain distribution in anchor heads can be useful in detecting wire breakage in unbonded construction. Based on this strain variation, this paper develops a damage detection model that enables an automated tendon monitoring system to identify and locate wire breaks. The first part of this paper presents an experimental program conducted to study the strain variation in anchor heads by generating wire breaks using a mechanical device. The program comprised three sets of tests with fully populated 19-strand anchor head and evaluated the levels of strain variation with number of wire breaks in different strands. The sensitivity of strain variation with wire breaks in circumferential and radial directions of anchor head in addition to the axial direction (parallel to the strand) were investigated and the measured axial strains were found to be the most sensitive. The second part of the paper focuses on formulating the wire breakage detection framework. A finite element model of the anchorage assembly was created to demonstrate the algorithm as well as to investigate the asymmetric strain distribution observed in experimental results. In addition, as almost inevitably encountered during tendon stressing, the effects of differential wedge seating on the proposed model have been analyzed. A sensitivity analysis has been performed at the end to assess the robustness of the model with random measurement errors.

Identification and Functional Analysis of Mating Type Loci in the Pleurotus eryngii

  • Ryu, Jae San;Kim, Min-Keun;Park, Bokyung;Ali, Asjad;Joung, Wan-Kyu
    • 한국균학회소식:학술대회논문집
    • /
    • 2015.11a
    • /
    • pp.35-35
    • /
    • 2015
  • Pleurotus eryngii has recently become a major cultivated mushroom; it uses tetrapolar heterothallism as a part of its reproductive process. Sexual development progresses only when the A and B mating types are compatible. Such mating incompatibility occasionally limits the efficiency of breeding programs in which crossing within loci-shared strains or backcrossing strategies are employed. Therefore, understanding the mating system in edible mushroom fungi will help provide a short cut in the development of new strains. We isolated and identified pheromone and receptor genes in the B3 locus of P. eryngii and performed a functional analysis of the genes in the mating process by transformation. A genomic DNA library was constructed to map the entire mating-type locus. The B3 locus was found to contain four pheromone precursor genes and four receptor genes. Remarkably, receptor PESTE3.3.1 has just 34 amino acid residues in its C-terminal cytoplasmic region; therefore, it seems likely to be a receptor-like gene. Real-time quantitative RT-PCR (real-time qRT-PCR) revealed that most pheromone and receptor genes showed significantly higher expression in monokaryotic cells than dikaryotic cells. The pheromone genes PEphb3.1 and PEphb3.3 and the receptor gene PESTE3.3.1 were transformed into P5 (A3B4). The transformants were mated with a tester strain (A4B4), and the progeny showed clamp connections and a normal fruiting body, which indicates the proposed role of these genes in mating and fruiting processes. This result also confirms that PESTE3.3.1 is a receptor gene. In this study, we identified pheromone and receptor genes in the B3 locus of P. eryngii and found that some of those genes appear to play a role in the mating and fruiting processes. These results might help elucidate the mechanism of fruiting differentiation and improve breeding efficiency.

  • PDF

IDENTIFICATION OF TWO-DIMENSIONAL VOID PROFILE IN A LARGE SLAB GEOMETRY USING AN IMPEDANCE MEASUREMENT METHOD

  • Euh, D.J.;Kim, S.;Kim, B.D.;Park, W.M.;Kim, K.D.;Bae, J.H.;Lee, J.Y.;Yun, B.J.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.613-624
    • /
    • 2013
  • Multi-dimensional two-phase phenomena occur in many industrial applications, particularly in a nuclear reactor during steady operation or a transient period. Appropriate modeling of complicated behavior induced by a multi-dimensional flow is important for the reactor safety analysis results. SPACE, a safety analysis code for thermal hydraulic systems which is currently being developed, was designed to have the capacity of multi-dimensional two-phase thermo-dynamic phenomena induced in the various phases of a nuclear system. To validate the performance of SPACE, a two-dimensional two-phase flow test was performed with slab geometry of the test section having a scale of $1.43m{\times}1.43m{\times}0.11m$. The test section has three inlet and three outlet nozzles on the bottom and top gap walls, respectively, and two outlet nozzles installed directly on the surface of the slab. Various kinds of two-dimensional air/water flows were simulated by selecting combinations of the inlet and outlet nozzles. In this study, two-dimensional two-phase void fraction profiles were quantified by measuring the local gap impedance at 225 points. The flow conditions cover various flow regimes by controlling the flow rate at the inlet boundary. For each selected inlet and outlet nozzle combination, the water flow rate ranged from 2 to 20 kg/s, and the air flow rate ranged from 2.0 to 20 g/s, which corresponds to 0.4 to 4 m/s and 0.2 to 2.3 m/s of the superficial liquid and gas velocities based on the inlet port area, respectively.

Development of a Fatigue Damage Model of Wideband Process using an Artificial Neural Network (인공 신경망을 이용한 광대역 과정의 피로 손상 모델 개발)

  • Kim, Hosoung;Ahn, In-Gyu;Kim, Yooil
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.52 no.1
    • /
    • pp.88-95
    • /
    • 2015
  • For the frequency-domain spectral fatigue analysis, the probability density function of stress range needs to be estimated based on the stress spectrum only, which is a frequency domain representation of the response. The probability distribution of the stress range of the narrow-band spectrum is known to follow the Rayleigh distribution, however the PDF of wide-band spectrum is difficult to define with clarity due to the complicated fluctuation pattern of spectrum. In this paper, efforts have been made to figure out the links between the probability density function of stress range to the structural response of wide-band Gaussian random process. An artificial neural network scheme, known as one of the most powerful system identification methods, was used to identify the multivariate functional relationship between the idealized wide-band spectrums and resulting probability density functions. To achieve this, the spectrums were idealized as a superposition of two triangles with arbitrary location, height and width, targeting to comprise wide-band spectrum, and the probability density functions were represented by the linear combination of equally spaced Gaussian basis functions. To train the network under supervision, varieties of different wide-band spectrums were assumed and the converged probability density function of the stress range was derived using the rainflow counting method and all these data sets were fed into the three layer perceptron model. This nonlinear least square problem was solved using Levenberg-Marquardt algorithm with regularization term included. It was proven that the network trained using the given data set could reproduce the probability density function of arbitrary wide-band spectrum of two triangles with great success.

Identification of Alkylation-Sensitive Target Chaperone Proteins and Their Reactivity with Natural Products Containing Michael Acceptor

  • Liu, Xi-Wen;Sok, Dai-Eun
    • Archives of Pharmacal Research
    • /
    • v.26 no.12
    • /
    • pp.1047-1054
    • /
    • 2003
  • Molecular chaperones have a crucial role in the folding of nascent polypeptides in endoplasmic reticulum. Some of them are known to be sensitive to the modification by electrophilic metabolites of organic pro-toxicants. In order to identify chaperone proteins sensitive to alkyators, ER extract was subjected to alkylation by 4-acetamido-4 -maleimidyl-stilbene-2,2 -disulfonate (AMS), and subsequent SDS-PAGE analyses. Protein spots, with molecular mass of 160, 100, 57 and 36 kDa, were found to be sensitive to AMS alkylation, and one abundant chaperon protein was identified to be protein disulfide isomerase (PDI) in comparison with the purified PDI. To see the reactivity of PDI with cysteine alkylators, the reduced form ($PDI_{red}$) of PDI was incubated with various alkylators containing Michael acceptor structure for 30 min at $38^{\circ}C$ at pH 6.3, and the remaining activity was determined by the insulin reduction assay. Iodoacetamide or N-ethylmaleimide at 0.1 mM remarkably inactivated $PDI_{red}$ with N-ethylmaleimide being more potent than iodoacetamide. A partial inactivation of $PDI_{oxid}$ was expressed by iodoacetamide, but not N-ethylmaleimide (NEM) at pH 6.3. Of Michael acceptor compounds tested, 1,4-benzoquinone ($IC_{50}, 15 \mu$ M) was the most potent, followed by 4-hydroxy-2-nonenal and 1,4-naphthoquinone. In contrast, 1,2-naphthoquinone, devoid of a remarkable inactivation action, was effective to cause the oxidative conversion of $PDI_{red}$ to $PDI_{oxid}$. Thus, the action of Michael acceptor compounds differed greatly depending on their structure. Based on these, it is proposed that POI, one of chaperone proteins in ER, could be susceptible to endogenous or xenobiotic Michael acceptor compounds in vivo system.

An Enhanced Affine Projection Sign Algorithm in Impulsive Noise Environment (충격성 잡음 환경에서 개선된 인접 투사 부호 알고리즘)

  • Lee, Eun Jong;Chung, Ik Joo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.420-426
    • /
    • 2014
  • In this paper, we propose a new affine projection sign algorithm (APSA) to improve the convergence speed of the conventional APSA which has been proposed to enable the affine projection algorithm (APA) to operate robustly in impulsive noise environment. The conventional APSA has two advantages; it operates robustly against impulsive noise and does not need calculation for the inverse matrix. The proposed algorithm also has the conventional algorithm's advantages and furthermore, better convergence speed than the conventional algorithm. In the conventional algorithm, each input signal is normalized by $l_2$-norm of all input signals, but the proposed algorithm uses input signals normalized by their corresponding $l_2$-norm. We carried out a performance comparison of the proposed algorithm with the conventional algorithm using a system identification model. It is shown that the proposed algorithm has the faster convergence speed than the conventional algorithm.

OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY

  • Favaro, Francesca M.;Saleh, Joseph H.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.803-816
    • /
    • 2014
  • Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose in this work a novel safety principle termed "observability-in-depth". We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sensemaking of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several "event reports" from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.