A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Purpose -Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of this research is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks (HSN). As large-scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the HSNs are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Design/methodology/approachdoi:10.1108/10662240910952364 fatcat:6tj36lktsbbt7g3remoscstx7q
more »... thodology/approach -We consider an heterogeneous sensor networks (HSN) consist of a small number of powerful high-end H-sensors and a large number of ordinary low-end L-sensors. However, homogeneous sensor networks (MSN) consists of only L-sensors. Since the collusion attack on key pre-distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, we update the key ring after initial deployment and generate new key rings by using one-way hash function on nodes' IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network. Findings -The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe. Originality/value -The proposed key management scheme outperforms the previous random key pre-distribution schemes by: a) considerably reducing the storage requirement, b) providing more resiliency against node capture and collusion attacks.
실제로 소장 위석 수술 후 재발하 여 재수술을 시행하거나 위장관 위석의 제거 후 잔류 위석 으로 소장 폐쇄가 재발하는 경우가 있기 때문이다.(6) DeBakey와 Ochsner(1)의 보고에서는 다발성의 빈도를 15%, Park 등(18)은 20%를 보고하고 있다. ...doi:10.4174/jkss.2009.77.3.177 fatcat:lnggbpdlnncvblbwra5paeja4a
Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for supporting defense against security threats. However, these existing approaches have failed to deal with security challenges in next-generation ICT systems due to the changingdoi:10.3390/sym12061044 fatcat:dury4tukzre7hblsusdxcg4zee
more »... e changing behaviors of security threats and zero-day attacks, including advanced persistent threat (APT), ransomware, and supply chain attacks. The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data. It offers the identification of unknown and new attack patterns by extracting hidden data patterns in next-generation ICT systems. Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis.
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial field. Moreover, many researchers have proposed the Industrial IoT (IIoT) architecture with blockchain for data integrity and efficient management. The IIoT network consists of many heterogeneous devices (e.g., sensors, actuators, and programmabledoi:10.3390/app9183740 fatcat:uoh2vsbqonhzflljumsecjerve
more »... s, and programmable logic controllers (PLC)) with resources-constrained, and the availability of the network must be preferentially considered. Therefore, applying the existed blockchain technology is still challenging. There are some results about the technique of constructing blockchain lightly to solve this challenge. However, in these results, the analysis in perspective of cryptographic performance (area, throughput, and power consumption) has not been considered sufficiently, or only focused on the architecture of the blockchain network. The blockchain technology is based on cryptographic techniques, and the main part is a cryptographic hash function. Therefore, if we construct the blockchain-based IIoT architecture, we have to consider the performance of the hash function. Many lightweight hash functions have been proposed recently for the resource-constrained environment, and it can also be used to the blockchain. Therefore, in this paper, we analyze the considerations of lightweight blockchain for IIoT. Also, we conduct an analysis of lightweight hash for blockchain, and propose a new lightweight hash-based blockchain architecture that can change the hash algorithm used for mining adjust to network traffic.
Background Paragangliomas are tumors that arise from extra-adrenal chromaffin cells. Herein, we present a rare case of a functional paraganglioma in the posterior mediastinum. Case presentation A 36-year-old man presented with paroxysms of chest pain and headache. At presentation, the patient's blood pressure was 190/120 mmHg. Chest computed tomography and magnetic resonance imaging revealed a left paravertebral mass in the posterior mediastinum. 123I-metaiodobenzylguanidine scanning revealeddoi:10.1186/s12872-020-01752-2 pmid:33225892 pmcid:PMC7682027 fatcat:vbpzkoacwjag7klzzikumva55a
more »... scanning revealed focally high tracer uptake in the left paravertebral area. The metanephrine level in the urine was elevated, confirming a rare, catecholamine-producing, functional paraganglioma in the posterior mediastinum. Before surgery, the patient was prepared by orally administering α- and β-adrenergic blockers. The mass was then resected via a lateral thoracotomy. The metanephrine level in urine was normal 24 h after surgery. Conclusions Paragangliomas in the posterior mediastinum are very rare, but more than half of all cases are functional. The associated symptoms are curable with complete resection, and long-term follow-up for recurrence is important.
In order to optimize resource provisions, Saurabh Singh, Pradip Sharma, Seo Moon, and Jong Hyuk Park addressed the challenge of harvesting energy generated from cloud data centers and proposed an effective ... To address the challenge of low power sensing in mobile devices, Dusan Baek, Jae-Hyeon Park, Byungjeong Lee, and Jung-Won Lee proposed an exclusive context resolver (ExCore) system. ...doi:10.3390/su11082264 fatcat:664e3ar3fbe57ci2l6ioyxezuq
Improving one property without sacrificing others is challenging for lithium-ion batteries due to the trade-off nature among key parameters. Here we report a chemical vapor deposition process to grow a graphene-silica assembly, called a graphene ball. Its hierarchical threedimensional structure with the silicon oxide nanoparticle center allows even 1 wt% graphene ball to be uniformly coated onto a nickel-rich layered cathode via scalable Nobilta milling. The graphene-ball coating improves cycledoi:10.1038/s41467-017-01823-7 pmid:29146973 pmcid:PMC5691064 fatcat:tpd3eswd2vh2tmy5bl4gihjdxi
more »... ting improves cycle life and fast charging capability by suppressing detrimental side reactions and providing efficient conductive pathways. The graphene ball itself also serves as an anode material with a high specific capacity of 716.2 mAh g −1 . A full-cell incorporating graphene balls increases the volumetric energy density by 27.6% compared to a control cell without graphene balls, showing the possibility of achieving 800 Wh L −1 in a commercial cell setting, along with a high cyclability of 78.6% capacity retention after 500 cycles at 5C and 60°C.
Today, information security and assurance is emerging as an important research issue in the manufacturing environments due to the rapid advances in IT. The special issue would concentrate on the research of intelligent manufacturing system and its security and assurance (IMSA). The goal of this special issue is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems, and solutions related to the multifaceted aspects of IMSA. Moreover, wedoi:10.1007/s10845-009-0263-0 fatcat:4zapj72jcfa7xibks4tuvs3w6a
more »... SA. Moreover, we expect that the special issue will be a trigger for further related researches and foster technology improvements in this vital subject. We are pleased to mention that responses to the call for papers have been very well received from 2008 International Conference on Information Security and Assurance (ISA-08) and after several rounds of paper review by the guest editors,
Wook Kim, Jie-Hyun Kim, Ji Hyun Kim, Yang Won Min, Chan Hyuk Park, Si Hyung Lee and Jong Yeul Lee), the Korean Society of Gastroenterology (Jung Ho Bae, Dong-Hoon Yang, Hyunsoo Chung and Kee Don Choi) ... , the Korean College of Helicobacter and Upper Gastrointestinal Research (Jun Chul Park and Hyuk Lee), the Korean Association for the Study of Intestinal Diseases (Min-Seob Kwak), the Korean Society of ...doi:10.5946/ce.2020.032 pmid:32252507 pmcid:PMC7137564 fatcat:5icvullp3jcorbmt2wovgembrq
Wook Kim, Jie-Hyun Kim, Ji Hyun Kim, Yang Won Min, Chan Hyuk Park, Si Hyung Lee, and Jong Yeul Lee), the Korean Society of Gastroenterology (Jung Ho Bae, Dong-Hoon Yang, Hyunsoo Chung, and Kee Don Choi ... ), the Korean College of Helicobacter and Upper Gastrointestinal Research (Jun Chul Park and Hyuk Lee), the Korean Association for the Study of Intestinal Diseases (Min-Seob Kwak), the Korean Society of ...doi:10.5217/ir.2020.00020 pmid:33045799 pmcid:PMC8100377 fatcat:nkojjef4sbaxrb4a6z274boeg4
Park et al. reported similar survival-related findings in Korean AYA patients with cancer; specifically, patients aged 15-19 years had lower survival rates than patients aged 20-39 years  . ...doi:10.3390/cells10102684 pmid:34685664 pmcid:PMC8534404 fatcat:qcsyycqyc5c3tjsywmqp6ounkm
, Jong Wook Kim, Dong Il Park, Kang Moon Lee, Jong Pil Im, Byong Duk Ye, Hyuk Yoon, and Suk-Kyun Yang), and one surgeon of The Korean Society of Coloproctology (Sang Nam Yoon). ... administered by the IBD study group of KASID, and the subcommittee on the development of the guidelines for the management of CD was composed of eight gastroenterologist of IBD Study Group of KASID (Jae Jun Park ...doi:10.5217/ir.2017.15.1.38 pmid:28239314 pmcid:PMC5323307 fatcat:bdtljv6px5c2xgw3liatxt7gzu
Rapidly Progressing Skull Osteolytic Metastasis Originated from Lung Squamous Cell Carcinoma Presenting as Forehead Hematoma Presenter: Shin Hyuk Kang, MD Co-Authors: Kyoung Min Lee, MD; Jong Hyun Park ...doi:10.1097/01.gox.0000526172.83670.dd fatcat:erzyuxad5rbmjcyaghlfm4ebgm
An in vivo tumorigenicity study was approved by the Institutional Animal Care and Use Committee (IACUC) at LG Life Sciences, R&D Park, Korea. ...doi:10.18632/oncotarget.6724 pmid:26716414 pmcid:PMC4885001 fatcat:kv23qsxsajas3oljoemf2yiydy
Recently, wearable technologies have evolved in the most unexpected field like a military force outside of healthcare, fitness, lifestyle and similar areas. The growing need for soldiers' coordination, training and health, the increase in asymmetric warfare, suspected geopolitical conflicts and soldiers' modernization programs, among others, are some of the factors that fuel the growth of the military wearables market. Wearable computation plays an important role in improving the capabilitiesdoi:10.1109/access.2020.2985313 fatcat:zfypq5bjxjflzbvoc2inpzw5gq
more »... the capabilities of the soldier. Further, the 5G network promises a solution to the many network and performance challenges in order to adopt more sophisticated wearable technologies in defense automation. In this paper, we conduct a study to identify the role of wearable computing for the defence automation system. We present the taxonomy of wearable computing in defence automation system and explain the relationship of each attribute. In addition, we identify the raise issues and challenges in communication and cybersecurity when deploying the 5G network in defense automation. Furthermore, we propose the design of the wearable smartwatch architecture as a use case of healthcare transformation in defense automation in the 5G environment. INDEX TERMS Wearable computing, 5G network, security and privacy, edge computing. VOLUME 8, 2020 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
« Previous Showing results 1 — 15 out of 1,364 results