• Title/Summary/Keyword: vault

Search Result 212, Processing Time 0.027 seconds

Kinematic Comparisons between Yang-1 and Yang-2 Vaults in Men's Artistic Gymnastics (남자 체조 YANG-1과 YANG-2 도마 동작의 운동학적 비교)

  • Park, Cheol-Hee;Kim, Young-Kwan
    • Korean Journal of Applied Biomechanics
    • /
    • v.24 no.4
    • /
    • pp.317-327
    • /
    • 2014
  • As a single subject study, it was purposed to investigate kinematic differences between Yang Hak Seon vault (i.e., handspring forward and salto forward straight with triple twist, Yang-1 vault hereafter) and Tsukahara $1260^{\circ}$ twist with salto forward straight (Yang-2 vault hereafter) in gymnastics. Yang Hak-Seon (23 years, 160 cm, and 52 kg) voluntarily participated in this study. Motion capture system, consisting of fourteen cameras, were used to measure Yang-2 vault with the sampling rate of 200 Hz. Twenty six reflective markers were placed on major anatomical points of 15 body segments. Successful two trials of Yang-2 vault were collected and analyzed for the comparison. Compared Yang-1 results were based on the previous study of Park and Song (2012). Results indicated superior linear kinematics of Yang-1 vault to those of Yang-2 vault before the touchdown of vault table. However, Yang-2 vault revealed superior angular kinematics to Yang 1 vault showing more trunk twist angle (a triple and a half twist) and its faster angular velocity during the airborne. The Yang 2 vault could has advantage of increasing angular motion than Yang 1 vault as a result of a half turn off the springboard onto the vault table and a sequential touchdown of the hands.

A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps (은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구)

  • Kim, Dae-gyu;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2022
  • General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.

Seismic analysis of a masonry cross vault through shaking table tests: the case study of the Dey Mosque in Algiers

  • Rossi, Michela;Calderini, Chiara;Roselli, Ivan;Mongelli, Marialuisa;De Canio, Gerardo;Lagomarsino, Sergio
    • Earthquakes and Structures
    • /
    • v.18 no.1
    • /
    • pp.57-72
    • /
    • 2020
  • This paper presents the results of a monodirectional shaking table test on a full-scale unreinforced masonry cross vault characterized by asymmetric boundary conditions. The specimen represents a vault of the mosque of Dey in Algiers (Algeria), reproducing in detail the mechanical characteristics of masonry, and the constructive details including the presence of some peculiar wooden logs placed within the vault's abutments. The vault was tested with and without the presence of two steel bars which connect two opposite sides of the vault. The dynamic behaviour of both the vault's configurations were studied by using an incremental dynamic analysis up to the collapse of the vault without the steel bars. The use of an innovative high-resolution 3D optical system allowed measure displacement data of the cross vault during the shake table tests. The experimental results were analysed in terms of evolution of damage mechanisms, and in-plane and out-of-plane deformations. Moreover, the dynamic properties of the structure were investigated by means of an experimental modal analysis.

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

A Simple Fingerprint Fuzzy Vault for FIDO

  • Cho, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5674-5691
    • /
    • 2016
  • Fast IDentity Online(FIDO) supports biometric authentications in an online environment without transmitting biometric templates over the network. For a given FIDO client, the "Fuzzy Vault" securely stores biometric templates, houses additional biometric templates, and unlocks private keys via biometrics. The Fuzzy Vault has been extensively researched and some vulnerabilities have been discovered, such as brute force, correlation, and key inversions attacks. In this paper, we propose a simple fingerprint Fuzzy Vault for FIDO clients. By using the FIDO feature, a simple minutiae alignment, and point-to-point matching, our Fuzzy Vault provides a secure algorithm to combat a variety of attacks, such as brute force, correlation, and key inversions. Using a case study, we verified our Fuzzy Vault by using a publicly available fingerprint database. The results of our experiments show that the Genuine Acceptance Rate and the False Acceptance Rate range from 48.89% to 80% and from 0.02% to 0%, respectively. In addition, our Fuzzy Vault, compared to existing similar technologies, needed fewer attempts.

Study on Rainfall Infiltration Into Vault of Near-surface Disposal Facility Based on Various Disposal Scenarios

  • Kwon, Mijin;Kang, Hyungoo;Cho, Chunhyung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.4
    • /
    • pp.503-515
    • /
    • 2021
  • In this study, rainfall infiltration in vault of the second near-surface disposal facility was evaluated on the basis of various disposal scenarios. A total of four different disposal scenarios were examined based on the locations of the radioactive waste containers. A numerical model was developed using the FEFLOW software and finite element method to simulate the behavior of infiltrated water in each disposal scenario. The effects of the disposal scenarios on the infiltrated water were evaluated by estimating the flux of the infiltrated water at the vault interfaces. For 300 years, the flux of infiltrated water flowing into the vault was estimated to be 1 mm/year or less for all scenario. The overall results suggest that when the engineered barriers are intact, the flux of infiltrated water cannot generate a sufficient pressure head to penetrate the vault. In addition, it is confirmed that the disposal scenarios have insignificant effects on the infiltrated water flowing into the vault.

Feasibility of a New Vault Technique through Kinematic Analysis of Yeo 2 and YANG Hak Seon Vaults

  • Song, Joo-Ho;Park, Jong-Hoon;Kim, Jin-Sun
    • Korean Journal of Applied Biomechanics
    • /
    • v.28 no.2
    • /
    • pp.69-78
    • /
    • 2018
  • Objective: The purpose of this study was to investigate the feasibility of a new vault technique through a kinematic comparison of the YANG Hak Seon and Yeo 2 vaults. Method: The photographic images of the YANG Hak Seon and Yeo 2 vaults were collected using a high-speed camera, and their kinematic characteristics were analyzed using three-dimensional image analysis. Results: During the post-flight phase of the Yeo 2 and YANG Hak Seon vaults, the time of flight, height of flight, and flight distance were similar. At the peak of the post-flight phase, the trunk rotation angle of the YANG Hak Seon vault rotated $457^{\circ}$ more than did the Yeo 2 vault. During the post-flight descending period, the twist velocity of the trunk was much faster with the YANG Hak Seon vault ($1,278^{\circ}/s$) than with the Yeo 2 vault ($1,016^{\circ}/s$). Conclusion: To succeed in the new technique, the average twist velocity during post-flight must be maintained at $1,058^{\circ}/s$ and the twist velocity must be increased from the ascending phase.

Evaluation of Thermal-hydraulic and Scaling Characteristics for Storage Vault (Storage Vault의 열유동 및 상사특성 평가)

  • Yu, Seung-hwan;Bang, Kyung-sik;Kim, Donghee;Lee, Kwan-Soo
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.2
    • /
    • pp.131-140
    • /
    • 2015
  • This research studied a scaling analysis for the selection of proper heat generation at tube for 1/4-scale storage vaults. First of all, the temperature field and velocity distribution of an original scale storage vault were analyzed and then numerical analysis of a 1/4-scale storage vault was performed to compare each model. The proper heat generation for a 1/4-scale storage vault, at which the temperature and velocity field of a 1/4-scale storage vault showed the best agreement with that of the original storage vault, was evaluated with proposed dimensionless parameters. The behavior of temperature and velocity of fluid in the 1/4-scale case were most similar to those of the original scale, using a heat flux 1.3 times higher than that seen in the original scale, which was approximately 190 W.

Rationale for Small Glenoid Baseplate: Position of Central Cage within Glenoid Vault (Exactech® Equinoxe® Reverse System)

  • Oh, Joo Han;Lee, Sanghyeon;Rhee, Sung-Min;Jeong, Hyeon Jang;Yoo, Jae Chul
    • Clinics in Shoulder and Elbow
    • /
    • v.22 no.1
    • /
    • pp.24-28
    • /
    • 2019
  • Background: Glenoid baseplate location is important to good clinical outcomes of reverse total shoulder arthroplasty (RTSA). The glenoid vault is the determining factor for glenoid baseplate location, but, to date, there are no reports on the effect of central cage location within the glenoid vault on RTSA outcomes when using the $Exactech^{(R)}$ $Equinoxe^{(R)}$ Reverse System. The purpose of this study was to determine the appropriate cage location in relation to the glenoid vault and monitor for vault and/or cortex penetration by the cage. Methods: Data were retrospectively collected from the Samsung Medical Center (SMC) and Seoul National University Bundang Hospital (SNUBH). Patients who underwent RTSA between November 2016 and February 2018 were enrolled. Glenoid vault depth, central cage location within the vault were examined. Inferior glenoid rim-center distance, inferior glenoid rim-cage distance, and center-cage center distances were collected. Results: Twenty-two patients were enrolled. Three SNUBH patients had inappropriate central cage fixation (33.3%) versus 4 SMC patients (30.8%). All cage exposures were superior and posterior to the glenoid vault. Mean center-cage distance was 5.0 mm in the SNUBH group and 5.21 mm in the SMC group. Center-prosthesis distance was significantly longer in the inappropriate fixation group than in the appropriate fixation group (p<0.024). Conclusions: To ensure appropriate glenoid baseplate fixation within the glenoid vault, especially in a small glenoid, the surgeon should place the cage lower than usually targeted, and it should overhang the inferior glenoid rim.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.