• 제목/요약/키워드: Correlation Attack

검색결과 195건 처리시간 0.028초

예인선배열 센서를 이용한 전방위 표적방위 탐지기 구현 (Implementation of the omnidirectional target bearing detector utilizing towed linear arrays)

  • 이성은;천승용;황수복;이형욱
    • 한국군사과학기술학회지
    • /
    • 제5권1호
    • /
    • pp.59-64
    • /
    • 2002
  • Passive sonar system forms the various beams in any desired directions to obtain the improvement in Signal-to-Noise(S/N) ratio, bearing detection and localization of targets, and the attenuation of interferences from other directions. Detection of modern underwater targets is becoming increasingly difficult as noise reduction technology leads to considerably low-level acoustic emissions. Therefore, the improvement of beamforming is very important to detect modern underwater targets at the long range in the complex environmental sea. Also, to react to the fast attack mobiles such as torpedoes, port and starboard discrimination is required to be performed very quickly. In this paper, we proposed the implementation of omnidirectional target bearing detector without port and starboard ambiguity to detect effectively the low-level underwater targets. The port and starboard discrimination is performed by cardioid processing and the improvement of beamforming utilizes the cross correlation matrix of individual hydrophone pairs of linear array sensors. The sea test result shows that the system implemented is good for the detection of the low-level underwater targets.

Impact of maternal crowd on the reproductive performance of an ecto-pupal parasitoid Nesolynx thymus (Hymenoptera: Eulophidae)

  • Siddaiah, Aruna Ambadahalli;Danagoudra, Manjunath
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • 제29권1호
    • /
    • pp.128-134
    • /
    • 2014
  • Nesolynx thymus Girault (Hymenoptera: Eulophidae) is one among 20 hymenopteran parasitoids reported to attack the uzi fly, Exorista bombycis, which in turn infests the silkworm, Bombyx mori accounting a cocoon yield loss of 10-20%. A host of factors viz., age and size of host, age and size of parasitoid, availability of host, temperature and quality of host are reported to influence the reproductive efficiency of the parasitoids. In the present study an attempt was made to record the influence of foraging parasitoid density on their reproductive performance. Three day-old uzi pupae were offered to varying numbers (1 - 10) of 2 day old Nesolynx thymus adults for parasitization. The progeny production per pupa (84.44 - 132.77) increased significantly with increase in the number of foraging parasitoid adults (1 - 10) however, progeny production per female decreased. The sex ratio (M : F) (1:25.49 - 1:1.53) decreased significantly with increase in foraging parasitoid adults. The morphometric parameters except female abdomen width of first generation parasitoid showed significant negative correlation with number of foraging adults. However, correlation between the parasitoid size in first generation and their reproductive performance was nonsignificant.

폭력영상 시청 시 개인의 공격성향과 생체 신호 변화의 상관관계 (Correlation of personal aggression and physiological signal during watching attack images)

  • 채미령;최미현;이수정;양재웅;정순철
    • 한국감성과학회:학술대회논문집
    • /
    • 한국감성과학회 2009년도 추계학술대회
    • /
    • pp.186-189
    • /
    • 2009
  • 본 연구에서는 폭력영상 시청 시 개인의 공격성향에 따른 생체신호(ECG, GSR)의 변화를 분석하였다. 남자 23 명(21.4 세, ${\pm}1.8$ 세)의 피험자의 공격성을 설문지로 측정하였다. 실험은 Rest(15 분), 안정영상 시청(2 분 14 초), 폭력영상 시청(50 초), 안정영상 시청(2 분 14 초)으로 구성되어 있다. 폭력영상은 패싸움·마루타 실험장면을 보여주었으며, 안정영상은 바다·산·계곡 등의 영상을 보여주었다. 폭력영상 시청 시 개인의 공격성향과 ECG 신호 사이의 상관관계는 관찰 할 수 없었으나, GSR 신호와는 음의 상관관계를 관찰 할 수 있었다. 이 결과는 공격성이 높은 사람일수록 폭력영상 시청 시 생체신호 변화가 작을 수 있음을 시사한다.

  • PDF

유아의 애착 및 어머니-유아 상호작용과 또래 상호작용간의 관계 (The Relation of Attachment and Mother-Child Interactions to Peer Interactions)

  • 이영;나유미
    • 아동학회지
    • /
    • 제20권3호
    • /
    • pp.19-32
    • /
    • 1999
  • This study analyzed the relation of children's attachment security and mother-child interaction to children's peer interactions. The subjects were 51 preschoolers, 44 to 57 months of age and their mothers. Attachment was assessed using the Attachment Q-set (Waters, 1987), mother-child interactions at home were observed with the use of the Teaching Strategies Rating Scales (Erickson, Sroufe, Egeland, 1985), and peer interactions were observed during free play time, using the Holloway and Erickson(1988) categories. Pearson correlation and multiple regression showed that attachment security scores were negatively related to dependency toward peers. Mother's "structure and limit setting" and "respect for child's autonomy" were positively related to "helping with peers" and negatively to "asking for help" and "physical attack". The variables accounting for dependency toward peers were mother's hostility and attachment security.

  • PDF

Corrosion Fatigue of Austenitic Stainless Steel in Different Hot Chloride Solutions

  • Visser, A.;Mori, G.;Panzenbock, M.;Pippan, R.
    • Corrosion Science and Technology
    • /
    • 제14권4호
    • /
    • pp.172-176
    • /
    • 2015
  • Austenitic stainless steel was investigated under cyclic loading in electrolytes with different chloride contents and pH and at different temperatures. The testing solutions were 13.2 % NaCl (80,000 ppm $Cl^-$) at $80^{\circ}C$and 43 % $CaCl_2$ (275,000 ppm $Cl^-$) at $120^{\circ}C$. In addition to S-N curves in inert and corrosive media, the fracture surfaces were investigated with a scanning electron microscope (SEM) to analyse the type of attack. The experimental results showed that a sharp decrease in corrosion fatigue properties can be correlated with the occurrence of stress corrosion cracking. The correlation of occurring types of damage in different corrosion systems is described.

RVS에 의한 폭발물테러 위험도 곡선 (Explosive-Terror Risk Curve by RVS)

  • 도기영;윤성원
    • 한국공간구조학회논문집
    • /
    • 제13권3호
    • /
    • pp.57-64
    • /
    • 2013
  • Since the terrorist attacks 9.11 in 2001, the public places such as subway, department stores or office buildings have become a target of terror in major public facilities. In this paper, for the prevention of terrorist attack in domestic building, the assessments of terror risk were conducted and their relationship with building heights was discussed through FEMA 455-Rapid Visual Screening(RVS). Explosive terror risk tends to increase rapidly with building heights(H<230m), showing the correlation coefficient between total risk and building heights(H<230m) is 0.93. In addition, The average of consequences is 8.47 and that of' threat is 8.95. Vulnerability is found to be 6.62 in average.

수축수열의 위상이동차 공격법 (Attack using Phase Shifts of Shrunken Sequence)

  • 최언숙;조성진;황윤희;김한두
    • 한국전자통신학회논문지
    • /
    • 제6권1호
    • /
    • pp.97-104
    • /
    • 2011
  • 높은 선형복잡도와 낮은 상관관계를 갖는 의사난수열은 통신 및 암호에 널리 사용된다. 본 논문에서는 수숙생성기에 의해 생성된 수축수열을 삽입수열로 해석하여 분석하고 후 위상이동차를 분석하여 수축수열의 일부 정보로부터 수축수열 모두를 알아내는 방법을 제안한다.

담근먹이 옥수수의 잎집무늬마름병 발생에 관한 연구 I. 생육시기 및 재배환경과 잎집무늬 마름병 발생 (Studies on the Occurrence of Corn Sheath Blight Caused by Rhizoctonia solsni I. Influence of growth season and cultural environment on the occurrence of sheath blight disease.)

  • 이상범;김정갑;한민수;한흥전
    • 한국초지조사료학회지
    • /
    • 제9권3호
    • /
    • pp.174-178
    • /
    • 1989
  • The investigation was carried out to identify the main pathogen infected with sheath blight in corn plant during 1986-1987. The main fungi of sheath blight isolated from corn plant was identified as Rhizoctonia sobni. Sheath blight in corn plant was first found in early July and infected extremely from late July to end August. Severe sheath blight disease was observed in Gyeongido (Yeoju and Suweon) and Jeonnam (Kwangju) area. The rate of attack was associatied with management and cultural environments of corn plant. Dense planting increased sheath blight, but application of cattle compost reduced the rate of infection. A positive correlation was found between infection rate of shealth blight and concentration of soluble carbohydrate in corn plant (r=0.96). The varieties of Jinjuok, Suweon 83, Suweon 87, Suweon 89, P.3055, P.3160, DK689 and XCG 51 showed remarkable tolerance to sheath blight disease.

  • PDF

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • 제43권4호
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.