127 research outputs found

    Creating Fatigue Curve for Steel Machine Elements Using Fatigue Test Method with Gradually Increasing Stress Amplitude

    Get PDF
    In order to create a fatigue curve, the traditional fatigue test method is applied to specimens using a cyclic stress with constant amplitude. However, this method has disadvantages such as the experimental results could not be used because of specimens broken before reaching the expected stress amplitude, or the tests may be stopped before specimen broken because of limitation of time. To overcome this hurdle of the traditional method, a new experimental method using cyclic stress with gradually increasing amplitude was proposed to build the fatigue curve for steel machine elements

    A Method for Authentication Services in Wireless Networks

    Get PDF
    With the widespread use of wireless network services and applications, security is a major concern. From wireless network security aspects, authentication for services is very important especially in Internet banking. In this paper, an authentication method for wireless networks using dynamic key theory is presented. The dynamic key theory is used to produce “one time keys” for authentication. These one time keys will improve the efficiency and security of wireless authentication. It can be applied for Internet banking and services in wireless networks

    COVID-19: Experience from Vietnam Medical Students

    Get PDF

    Impact of the modulus switching technique on some attacks against learning problems

    Get PDF
    © The Institution of Engineering and Technology 2019. The modulus switching technique has been used in some cryptographic applications as well as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the learning with rounding (LWR) problem, it seems that one does not know whether the technique is really useful or not. This work supplies a complete view of the impact of this technique on the decoding attack, the dual attack and the primal attack against both LWE and LWR. For each attack, the authors give the optimal formula for the switching modulus. The formulas get involved the number of LWE/LWR samples, which differs from the known formula in the literature. They also attain the corresponding sufficient conditions saying when one should utilise the technique. Surprisingly, restricted to the LWE/LWR problem that the secret vector is much shorter than the error vector, they also show that performing the modulus switching before using the so-called rescaling technique in the dual attack and the primal attack make these attacks worse than only exploiting the rescaling technique as reported by Bai and Galbraith at the Australasian conference on information security and privacy (ACISP) 2014 conference. As an application, they theoretically assess the influence of the modulus switching on the LWE/LWR-based second round NIST PQC submissions

    Identifying Computer-Translated Paragraphs using Coherence Features

    Get PDF
    We have developed a method for extracting the coherence features from a paragraph by matching similar words in its sentences. We conducted an experiment with a parallel German corpus containing 2000 human-created and 2000 machine-translated paragraphs. The result showed that our method achieved the best performance (accuracy = 72.3%, equal error rate = 29.8%) when it is compared with previous methods on various computer-generated text including translation and paper generation (best accuracy = 67.9%, equal error rate = 32.0%). Experiments on Dutch, another rich resource language, and a low resource one (Japanese) attained similar performances. It demonstrated the efficiency of the coherence features at distinguishing computer-translated from human-created paragraphs on diverse languages.Comment: 9 pages, PACLIC 201

    Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing

    Get PDF
    Nowadays, together with stormy technology advancement, billions of interconnected devices are constantly collecting data around us. In that fashion, privacy protection has become a major concern. The data must be in encrypted form before being stored on the cloud servers. As a result, the cloud servers are unable to perform calculations on en- crypted data, such as searching and matching keywords. In the PKE- MET setting, a cloud server can perform an equality test on a number of ciphertexts which encrypted with the same designated number. In this paper, we propose, for the first time, an efficient construction of a quantum-safe PKE-MET system based on the hardness of the Learning with Errors (LWE) problem in the lattice setting. Furthermore, we also discuss the first lattice-base public key encryption with flexible multi- ciphertext equality test (PKE-FMET) constructions, which allow per- forming equality test on multiple ciphertexts whose designated numbers are less than a threshold number. Our proposed schemes are proven to be secure in the standard model

    LEARNING INTERACTION MEASURE WITH RELEVANCE FEEDBACK IN IMAGE RETRIEVAL

    Get PDF
    Relevance feedback is an eective approach to bridge the gap between low-level featureextraction and high-level semantic concept in content-based image retrieval (CBIR). In this paper,we further improve the use of users feedback with multi-feature query and the Choquet integral.Taking into account the interaction among feature sets, feedback information are used to adjust thefeature's relevance weights that are considered as the fuzzy density values in the Choquet integralto dene the overall similarity measure between two images. The feature weight adjustment andintegration aims at minimizing the dierence between users desire and outcome of the retrieval system.Experimental results on several benchmark datasets have shown the eectiveness of the proposedmethod in improving the quality of CBIR systems

    Hydrogen Gas Sensing Using Palladium-Graphene Nanocomposite Material Based on Surface Acoustic Wave

    Get PDF
    We report the fabrication and characterization of surface acoustic wave (SAW) hydrogen sensors using palladium-graphene (Pd-Gr) nanocomposite as sensing material. The Pd-Gr nanocomposite as sensing layer was deposited onto SAW delay line sensor-based interdigitated electrodes (IDTs)/aluminum nitride (AlN)/silicon (Si) structure. The Pd-Gr nanocomposite was synthesized by a chemical route and deposited onto SAW sensors by air-brush spraying. The SAW H2 sensor using Pd-Gr nanocomposite as a sensing layer shows a frequency shift of 25 kHz in 0.5% H2 concentration at room temperature with good repeatability and stability. Moreover, the sensor showed good linearity and fast response/recovery within ten seconds with various H2 concentrations from 0.25 to 1%. The specific interaction between graphene and SAW transfer inside AlN/Si structures yields a high sensitivity and fast response/recovery of SAW H2 sensor based on Pd-Gr/AlN/Si structure

    Identifying Computer-Generated Text Using Statistical Analysis

    Get PDF

    An Approach for Gait Anonymization Using Deep Learning

    Get PDF
    • 

    corecore