• Title/Summary/Keyword: A key technique

Search Result 1,732, Processing Time 0.034 seconds

Simulation Based Method for Mid-and-Long Term Technological Forecasting (중장기 기술예측을 위한 시뮬레이션 기반 방법론)

  • Yu, Sung-Yeol
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.372-380
    • /
    • 2010
  • In this study, we consider a mid-and-long term technological forecasting method based on simulation technique. We, first, gather information about a point of appearance time of new technologies which will be developed in the future and influence relationship among those technologies by Delphi survey. And then we propose a simulation-based heuristic approach searching for the key technology among new technologies which will be developed to attain a normative objective using the Delphi data. We also provide the range of occurrence time for individual technology and define key technologies in this study in contrast that a expert's estimate to occurrence time is only one point in traditional Delphi survey. The information for key technologies which are detected by this procedure gives priorities of R&D planning and aids the R&D planner or project manager in resource allocation.

Multiple damages detection in beam based approximate waveform capacity dimension

  • Yang, Zhibo;Chen, Xuefeng;Tian, Shaohua;He, Zhengjia
    • Structural Engineering and Mechanics
    • /
    • v.41 no.5
    • /
    • pp.663-673
    • /
    • 2012
  • A number of mode shape-based structure damage identification methods have been verified by numerical simulations or experiments for on-line structure health monitoring (SHM). However, many of them need a baseline mode shape generated by the healthy structure serving as a reference to identify damages. Otherwise these methods can hardly perform well when multiple cracks conditions occur. So it is important to solve the problems above. By aid of the fractal dimension method (FD), Qiao and Wang proposed a generalized fractal dimension (GFD) to detect the delamination damage. As a modification of GFD, Qiao and Cao proposed the approximate waveform capacity dimension (AWCD) technique to simplify the calculation of fractal and overcome the false peak appearing in the high mode shapes. Based on their valued work, this paper combined and applied the AWCD method and curvature mode shape data to detect multiple damages in beam. In the end, the identification properties of the AWCD for multiple damages have been verified by groups of Monte Carlo simulations and experiments.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

Improvement of a Pound-Drever-Hall Technique to Measure Precisely the Free Spectral Range of a Fabry-Perot Etalon

  • Seo, Dong-Sun;Park, Chongdae;Leaird, Daniel E.;Weiner, Andrew M.
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.4
    • /
    • pp.357-362
    • /
    • 2015
  • We examine the principle of a modified Pound-Drever-Hall (PDH) technique to measure the free spectral range of a Fabry-Perot etalon (FPE). The FPE's periodic transmission of phase-modulated light allows us to adopt a sampling theorem to develop a new relationship for the PDH error signal. This leads us to find the key parameters governing the measurement accuracy: the phase modulation index ${\beta}$ and the FPE finesse. Without any additional complexity for background noise reduction, we achieve a measurement accuracy of 0.5 ppm. The improvement is mainly attributed to the wide-band phase modulation approaching ${\beta}=10$, and partly to the use of both reflected and transmitted light from the FPE and good FPE finesse.

DiLO: Direct light detection and ranging odometry based on spherical range images for autonomous driving

  • Han, Seung-Jun;Kang, Jungyu;Min, Kyoung-Wook;Choi, Jungdan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.603-616
    • /
    • 2021
  • Over the last few years, autonomous vehicles have progressed very rapidly. The odometry technique that estimates displacement from consecutive sensor inputs is an essential technique for autonomous driving. In this article, we propose a fast, robust, and accurate odometry technique. The proposed technique is light detection and ranging (LiDAR)-based direct odometry, which uses a spherical range image (SRI) that projects a three-dimensional point cloud onto a two-dimensional spherical image plane. Direct odometry is developed in a vision-based method, and a fast execution speed can be expected. However, applying LiDAR data is difficult because of the sparsity. To solve this problem, we propose an SRI generation method and mathematical analysis, two key point sampling methods using SRI to increase precision and robustness, and a fast optimization method. The proposed technique was tested with the KITTI dataset and real environments. Evaluation results yielded a translation error of 0.69%, a rotation error of 0.0031°/m in the KITTI training dataset, and an execution time of 17 ms. The results demonstrated high precision comparable with state-of-the-art and remarkably higher speed than conventional techniques.

Two-round ID-based Group Key Agreement Fitted for Pay-TV System (유료 방송 시스템에 적합한 ID기반의 2 라운드 그룹키 동의 프로토콜)

  • Kim Hyunjue;Nam Junghyun;Kim Seungjoo;Won Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.41-55
    • /
    • 2005
  • A group key agreement protocol allows a group of user to share a key which may later be used to achieve certain cryptographic goals. In this paper, we propose a new scalable two-round ID-based group key agreement protocol which would be well fit to a Pay-TV system, additionally. to the fields of internet stock quotes, audio and music deliveries, software updates and the like. Our protocol improves the three round poop key agreement protocol of Nam et al., resulting in upgrading the computational efficiency by using the batch verification technique in pairing-based cryptography. Also our protocol simplifies the key agreement procedures by utilizing ID-based system. We prove the security of our protocol under the Computational Diffie-Hellman assumption and the Bilinear Decisional Diffie-Hellman assumption. Also we analyze its efficiency.

An optical encryption system for Joint transform correlator (JTC 구조를 이용한 광학적 영상 암호화 시스템)

  • 박세준;서동환;이응대;김종윤;김정우;이하운;김수중
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.63-66
    • /
    • 2001
  • In this paper a binary image encryption technique and decryption system based on a joint transform correlator (JTC) are Proposed. In this method, a Fourier transform of the encrypted image is used as the encrypted data and a Fourier transform of the random phase is used as the key code. The original binary image can be reconstructed on a square law device, such as a CCD camera after the joint input is inverse Fourier transformed. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF

A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment (무선 랜 환경에서 안정적인 로밍을 위한 선행 인증기법 설계)

  • Hong, Soon-Ja;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.33-41
    • /
    • 2006
  • Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.

  • PDF

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.