The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Two-stage reactively matched gain cells are applied to design a high-gain multi-octave distributed power amplifier (DPA) in this paper. The proposed reactively matched distributed amplifier (RMDA) structure shows a high gain and high output power performance within a small die size. The DC bias network of each section is simplified to implement the proposed structure in an MMIC and the design guide...
A 6–18 GHz gallium nitride (GaN) non-uniform distributed amplifier (NDA) monolithic microwave integrated circuit with high power density is implemented with compact four-way combined power. The drain lines and gate lines are shared among the combined NDAs. Sharing drain (or gate) lines reduces the drain (or gate) line length by half, while keeping the same characteristic impedances and eliminates...
XO-64 block cipher provides a high performance with small hardware requirement in implementation. It is designed in improvement of high applicability, high flexibility, and high reliability in fast and efficient telecommunication system, based on conception of data-dependent operation (DDO); same as some other ciphers MD-64, KT-64, Eagle-64, Eagle-128...; and substitution permutation network (SPN)...
This paper proposes a tracklet-based algorithm for online multiple-target tracking. The algorithm performs tracking in three steps: (1) tracklet initialization, (2) tracklet refinement, and (3) tracklet association. Given detection responses, tracklets are initialized by finding a near-optimum path in the min-cost flow network using a greedy-based algorithm. Based on an appearance-based model, the...
Using thousands of infected internet computers to launch distributed denial of service attack against companies and governments internet resources by attackers is becoming dangerously common trend. Recently, there is a growing trend towards attackers, using IRC (Internet Relay Chat) protocol-based botnet for control and command infected internet computers. The botnet consists of the infected computers,...
Real-time multi-object tracking is one of the most challenging problem in computer vision. Based on integer linear programming (ILP) formulation for object tracking [1, 2], we propose the greedy algorithm for real-time multi-object tracking. The experimental result shows that the performance of the proposed algorithm is competitive to the previous state-of-the-art algorithms on off-line video data,...
SEED is a 128-bit block cipher supporting 128, 192 and 256-bit secret keys. It has been adopted as a national industrial association standard (TTAS KO-12.0004) at 1999 and ISO/IEC 18033-3 and IETF RFC 4269 at 2005. The first cryptanalytic result on DFA is proposed in 2004. After that Jeong et al. proposed DFAs on SEED-128/192/256. In these attacks, an attacker can induce 1-bit random fault to input...
MD-64 is a 64-bit block cipher with a 128-bit secret key and is based on data-dependent operations for the fast hardware performance. MD-64 is suitable to applications in resource constrained environments such as wireless sensor networks. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. Our attack requires 2^{95} MD-64 encryptions with 2^{43.1} related-key...
To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analyzed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial...
A virtual disk encryption tool is a privacy protection tool that uses an encryption method by generating virtual disk images. It cannot mount an encrypted virtual disk without any authentication, such as key, passphrase, and etc. Thus, it can be used as an anti- forensic tool that makes difficult to process a digital forensic investigation because the content of the virtual disk cannot be identified...
Since SMBs have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet they cannot organize information security team to operate integrated information security management system with consistency and it is fact that there only occur instant introductions of certain system. In this study, we designed information...
The present article issues the latest research and development in context-aware middleware and intelligent agents for smart environments. Smart environments-smart homes, smart offices, smart schools, and so on-represent advanced communication and computing environments featuring continually evolving everyday objects for nonexpert users. Smart environments have rapidly emerged as an exciting new paradigm...
Users and resources in a system are defined subjects and objects separately and abstractly by a mandatory access control mechanism. Both subjects and objects are endowed with security levels. The computer's security on basis of the operating system, and the operating system is the basic software of a computer. We present a model of security operating system. As we know the operating system has many...
In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 244,and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results...
Manipulation of biomolecules in microfluidic channel is very important in biochip technology. Here, we report a label-free handling method of biomolecules using magneto-hydro-dynamic (MHD) force. Phospholiposome was used in our experiments as it contains charged phospholipids and is spherical. Its mobility in microfluidic channel was analyzed by CFD (Fluent 6.2) and experiments were performed thereafter...
In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.