http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Agricultural Biotechnology in Canada: From Lab to Commercialization
Mclaughlin, Murray The Korean Society of Plant Biotechnology 1997 식물생명공학회지 Vol.24 No.4
Twenty six per cent of Canada's core biotech companies are Ag-biotechnology, compared with five per cent in the United States. Activities include the use of microorganisms, plant cells to create commercially viable products, and transformation of plants to improve specific qualities. Goals ate to increase the world's food supply, enable crops and animals to resist pests and diseases, increase the nutritional content of food, and improve production efficiency. I believe that there are business opportunities in the agriculture sector for Canada and other countries such as Korea to collaborate. These are research to research : institute to institute: business to business, and combinations of these areas. However, for these opportunities to become a reality we need to increase our awareness of each other's activities and needs. My presentation today was not designed with specifics, but to encourage some strategic thinking by both countries on how we can do business together in agriculture and biotechnology.
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
Hyoungsuk Jeon,McLaughlin, Steven W.,Il-Min Kim,Jeongseok Ha IEEE 2014 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS Vol.13 No.4
<P>We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to relay the primary users' messages in reward for being allowed to share the primary users' spectrum bands. However, the primary users might be reluctant to accept this help, since the secondary users are untrustworthy and may try unauthorized decoding of the primary users' messages. This paper will answer the question: when is this cooperation mutually beneficial for primary and secondary users? Taking an approach of information-theoretic secrecy, such as coding techniques for wiretap channels, the primary users can allow the secondary users to sense and relay the message, while ensuring that the secondary users are ignorant of the primary users' messages. We characterize an achievable secrecy rate of primary users with a rate of the secondary users' communication. From the derived rate pairs, an optimization problem is formulated such that the secondary transmitter distributes its transmit power to maximize its data rate while providing a higher secrecy rate to the primary users. We demonstrate that this cooperation can provide a positive secrecy rate, even when a non-cooperative scheme achieves a zero secrecy rate.</P>
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Yang, Y.,McLaughlin, K.,Sezer, S.,Littler, T.,Im, E. G.,Pranggono, B.,Wang, H. F. IEEE 2014 IEEE transactions on power delivery Vol.29 No.3
<P>The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.</P>
Malware detection: program run length against detection rate
Okane, Philip,Sezer, Sakir,McLaughlin, Kieran,Eul Gyu Im IET 2014 IET software Vol.8 No.1
<P>N-gram analysis is an approach that investigates the structure of a program using bytes, characters or text strings. This research uses dynamic analysis to investigate malware detection using a classification approach based on N-gram analysis. A key issue with dynamic analysis is the length of time a program has to be run to ensure a correct classification. The motivation for this research is to find the optimum subset of operational codes (opcodes) that make the best indicators of malware and to determine how long a program has to be monitored to ensure an accurate support vector machine (SVM) classification of benign and malicious software. The experiments within this study represent programs as opcode density histograms gained through dynamic analysis for different program run periods. A SVM is used as the program classifier to determine the ability of different program run lengths to correctly determine the presence of malicious software. The findings show that malware can be detected with different program run lengths using a small number of opcodes.</P>
LDPC Codes for the Gaussian Wiretap Channel
Klinc, D.,Jeongseok Ha,McLaughlin, S. W.,Barros, J.,Byung-Jae Kwak IEEE 2011 IEEE transactions on information forensics and sec Vol.6 No.3
<P>This paper presents a coding scheme for the Gaussian wiretap channel based on low-density parity-check (LDPC) codes. The messages are transmitted over punctured bits to hide data from eavesdroppers. The proposed coding scheme is asymptotically effective in the sense that it yields a bit-error rate (BER) very close to 0.5 for an eavesdropper whose signal-to-noise ratio (SNR) is lower than the threshold SNR<I>E</I>, even if the eavesdropper has the ability to use a bitwise maximum a posteriori (MAP) decoder. Such codes also achieve high reliability for the friendly parties provided they have an SNR above a second threshold SNR<I>B</I> . It is shown how asymptotically optimized LDPC codes are designed with differential evolution where the goal is to achieve high reliability between friendly parties while keeping the security gap SNR<I>B</I>/SNR<I>E</I> as small as possible to protect against passive eavesdroppers. The proposed coding scheme is encodable in linear time, applicable at finite block lengths, and can be combined with existing cryptographic schemes to deliver improved data security by taking advantage of the stochastic nature of many communication channels.</P>
Oh, Seyool,Cho, Inje,McLaughlin, Craig The Society for Aerospace System Engineering 2016 International Journal of Aerospace System Engineer Vol.3 No.2
The improvements in high performance and agility of modern fighter aircraft have led to improvements in survivability as well. Related to these performance increases are rapid response and adequate deflection of the control surfaces. Most control surface failures result from the failure of the actuator. Therefore, the failure and behavior of the actuators are essential to both combat aircraft survivability and maneuverability. In this study, we investigate the effects of flaperon actuator failure on flight maneuvers of a supersonic aircraft. The flight maneuvers were analyzed using six degrees of freedom (6DOF) simulations. This research will contribute to improvements in the reconfiguration of control surfaces and control allocation in flight control algorithms. This paper compares the results of these 6DOF simulations with the horizontal tail actuator failures analyzed previously.