• Title/Summary/Keyword: 무부하

Search Result 372, Processing Time 0.03 seconds

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Effects of Wearing Spandex Pants on Impact Forces and Muscle Activities during Drop Landing (드롭 착지 동작 시 탄성 섬유 바지 착용이 충격력과 근육 활동에 미치는 영향)

  • Chae, Woen-Sik;Kang, Nyeon-Ju
    • Korean Journal of Applied Biomechanics
    • /
    • v.19 no.3
    • /
    • pp.603-610
    • /
    • 2009
  • The purpose of this study was to determine how spandex pants affect impact force and muscle activities in the lower extremity. Seven pairs of surface electrodes were attached to the right-hand side of the body. Paired t-test was performed to test if significant difference exist between two conditions(p< .05). The average IEMG activities in the TA, BF, and GM during the landing phase reduced significantly with spandex pants compared to regular pants. All peak IEMG activities except the RF in wearing spandex pants group were significantly greater than the corresponding values in wearing regular pants one. The greater muscle activity recorded in wearing spandex pants can be attributed to the greater motor unit recruitment needed to decelerate and stabilized their bodies. Impact force and loading rate were not significantly decreased with wearing spandex pants. Since the spandex pants used in this study were not custom-fit based on girth of each participants thigh and shank, compression and elasticity for the pants could not be optimized.

An Energy Consumption Prediction Model for Smart Factory Using Data Mining Algorithms (데이터 마이닝 기반 스마트 공장 에너지 소모 예측 모델)

  • Sathishkumar, VE;Lee, Myeongbae;Lim, Jonghyun;Kim, Yubin;Shin, Changsun;Park, Jangwoo;Cho, Yongyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.5
    • /
    • pp.153-160
    • /
    • 2020
  • Energy Consumption Predictions for Industries has a prominent role to play in the energy management and control system as dynamic and seasonal changes are occurring in energy demand and supply. This paper introduces and explores the steel industry's predictive models of energy consumption. The data used includes lagging and leading reactive power lagging and leading current variable, emission of carbon dioxide (tCO2) and load type. Four statistical models are trained and tested in the test set: (a) Linear Regression (LR), (b) Radial Kernel Support Vector Machine (SVM RBF), (c) Gradient Boosting Machine (GBM), and (d) Random Forest (RF). Root Mean Squared Error (RMSE), Mean Absolute Error (MAE) and Mean Absolute Percentage Error (MAPE) are used for calculating regression model predictive performance. When using all the predictors, the best model RF can provide RMSE value 7.33 in the test set.

A Study on the High Frequency Resonant Inverter of Class D SEPP type using LS-ZVS-LSTC (LS-ZVS-LSTC를 이용한 D급 SEPP형 고주파 공진 인버터에 관한 연구)

  • Park, Dong-Han;Choi, Byeong-Joo;Kim, Jong-Hae
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.260-268
    • /
    • 2020
  • This paper presents the high frequency resonant inverter of class D SEPP(Single-Ended Push Pull) type using LS-ZVS-LSTC, which can reduce the switching losses during the turn-on and turn-off switching time. The analysis of high frequency resonant inverter using LS-ZVS-LSTC(Low-loss Turn-off Snubber Capacitor) proposed in this paper is described in general by adopting the normalized parameters. The operating characteristics of the proposed high frequency resonant inverter were also evaluated by using the control parameters such as the normalized control frequency(μ), the normalized load time constant(τ), the coupling factor(κ) and so on. Based on the characteristic values through the characteristics of evaluation, an example of the design method of the 1.8[kW] class D SEPP type high frequency inverter is suggested, and the validity of the theoretical analysis is verified using the experimental data.

Water Resources Assessment of the North Han River Watershed Using the DPSIR Concept (DPSIR 개념을 이용한 북한강 유역의 수자원 평가)

  • Lee, Kil-Seong;Sung, Jin-Young;Chung, Eun-Sung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.813-816
    • /
    • 2010
  • 최근 지속가능한 개발의 개념은 국제적으로 경제 개발과 환경 보전 사이에서 논쟁이 중심이 되고 있으며, 수자원 개발과 관리는 이들 논쟁에서 중요한 부분을 차지하고 있다. 이와 더불어 유역을 관리함에 있어 수자원을 이수, 치수 및 수질의 단일 문제로 인식하는 것이 아니라 통합적으로 인식하는 유역통합관리(Integrated Watershed Management, IWM)의 필요성이 대두되고 있다. 이에 본 연구는 유역통합관리에 앞서 유역의 상태 및 문제점을 파악하기 위한 방법으로 EEA (European Environment Agency)에서 개발한 추진력(Driving force)-압력(Pressure)-상태(State)-영향(Impact)-반응(Response) (DPSIR) 개념 이용하여 3개의 세부 지표인 이수지표, 치수지표, 수질지표로 구성된 하나의 통합 지수인 유역수자원평가지수를 개발하였다. 세부지표인 이수지표는 연속무강우일수, 인구밀도, 용수수요, 물재이용률 등 16개의 구성요소, 치수지표는 홍수범람위험 지역 내 거주 인구수, 홍수방어시설용량, 개수율, 100 mm 이상 강수일수 등 15개의 구성요소, 수질지표는 BOD (Biochemical Oxygen Demend) 부하량, 수질 등급, 연중 목표 수질 달성일수 등 13개의 구성요소로 이루어져있다. 이를 북한강 유역 중 북한 지역을 제외한 유역 즉, 수자원단위지도 상의 춘천댐권역(1010) ~ 청평댐권역(1015)의 6개 중권역에 적용하여 비교하였다. 세부지표의 주된 요소인 유출량의 모의를 위해 장기유출모형인 HSPF (Hydrological Simulation Program - Fortran)를 사용하였다. 모형에 입력된 유역평균강수량 자료는 1973년 ~ 2008년까지의 37년의 자료기간을 갖는 북한강유역의 5개 기상관측소 자료를 Thiessen network를 이용하여 산정하였다. 본 연구를 통해서 북한강 유역의 현재 수자원의 상태를 지수화하여 나타내고 그 결과를 비교해보았다. 이 결과는 유역 수자원의 파악하여 유역통합관리시 유역의 문제점을 파악하고 이를 수정하기 위한 의사결정 우선순위를 정하는데 사용될 수 있다.

  • PDF

A Study of the WPT Module Using Inductive Coupling for the Convergence Applications (융합형 어플리케이션을 위한 자기유도 방식의 무선전력전송 모듈설계에 대한 연구)

  • Jeong, Byeong-Ho;Park, Ju-Hoon;Kang, Bo-An
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.57-64
    • /
    • 2015
  • Inductive Power Transfer (IPT) systems have successfully been developed and used to replace traditional conductive power transfer systems where physical connection is either inconvenient or impossible, such as biomedical implants, undersea vehicles, and contactless battery chargers of robots, for providing power to movable or detachable loads. Inductive Coupling uses magnetic fields to transfer power. There is a primary coil, which generates a magnetic field. Then there is another secondary coil which is composed of a capacitor and a coil, the capacitor creates a circuit with the primary and secondary coils. This paper discusses design method and several implementation alternatives for wireless energy transmission systems. It presents realization examples for these alternatives. Wireless energy transmission is investigated in numerous convergence applications due to its simplicity and advantages.

S-RCSA : Efficiency Analysis of Sectored Random Cluster Header Selection Algorithm (섹터화된 랜덤 클러스터 헤더 선출 알고리즘 효율성 분석)

  • Kim, Min-Je;Lee, Doo-Wan;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.831-834
    • /
    • 2011
  • LEACH(One of the leading algorithms in the field of WSN) for the life of the system, even by the number of all nodes to ensure that the cluster header. However, each round does not guarantee a certain number of cluster header. So sometimes cluster header is elected of small number or not elected. If cluster header number is to small, takes a heavy load on cluster header. And empty cluster is occur depending on the location of the cluster header. The algorithm proposed in this paper, the area of interest is divided into sectors. And randomly, cluster header be elected one the in each sector. When clustering the sensor nodes will belong to the nearest cluster header. So clustering is independent of the sector. This algorithm is guarantee a certain number of cluster header in each round. And has prevent occurrence of empty cluster.

  • PDF

Performance Analysis of Random Resource Selection in LTE D2D Discovery (LTE D2D 디스커버리에서 무작위 자원 선택 방법에 대한 성능 분석)

  • Park, Kyungwon;Kim, Joonyoung;Jeong, Byeong Kook;Lee, Kwang Bok;Choi, Sunghyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.577-584
    • /
    • 2017
  • Long Term Evolution device-to-device (LTE D2D) is a key technology to mitigate data traffic load in a cellular system. It facilitates direct data exchange between neighboring users, which is preceded by D2D discovery. Each device advertises its presence to neighboring devices by broadcasting its discovery message. In this paper, we develop a mathematical analysis to assess the probability that discovery messages are successfully transmitted at the D2D discovery stage. We make use of stochastic geometry for modeling spatial statistics of nodes in a two dimensional space. It reflects signal to noise plus interference ratio (SINR) degradation due to resource collision and in-band emission, which leads to the discovery message reception probability being modeled as a function of the distance between the transmitter and the receiver. Numerical results verify that the newly developed analysis accurately estimates discovery message reception probabilities of nodes at the D2D discovery stage.

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies (블록체인 시스템의 보안성 분석: 암호 화폐에서의 사례 연구)

  • Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.5-14
    • /
    • 2018
  • With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.