• Title/Summary/Keyword: System Code

Search Result 6,238, Processing Time 0.038 seconds

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Survival network based Android Authorship Attribution considering overlapping tolerance (중복 허용 범위를 고려한 서바이벌 네트워크 기반 안드로이드 저자 식별)

  • Hwang, Cheol-hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.13-21
    • /
    • 2020
  • The Android author identification study can be interpreted as a method for revealing the source in a narrow range, but if viewed in a wide range, it can be interpreted as a study to gain insight to identify similar works through known works. The problem found in the Android author identification study is that it is an important code on the Android system, but it is difficult to find the important feature of the author due to the meaningless codes. Due to this, legitimate codes or behaviors were also incorrectly defined as malicious codes. To solve this, we introduced the concept of survival network to solve the problem by removing the features found in various Android apps and surviving unique features defined by authors. We conducted an experiment comparing the proposed framework with a previous study. From the results of experiments on 440 authors' identified apps, we obtained a classification accuracy of up to 92.10%, and showed a difference of up to 3.47% from the previous study. It used a small amount of learning data, but because it used unique features without duplicate features for each author, it was considered that there was a difference from previous studies. In addition, even in comparative experiments with previous studies according to the feature definition method, the same accuracy can be shown with a small number of features, and this can be seen that continuously overlapping meaningless features can be managed through the concept of a survival network.

A Study on the Data Cleaning and Standardization of National Ecosystem Survey in Korea (전국자연환경조사 데이터 정제와 표준화 방안 연구)

  • Kwon, Yong-Su;Song, Kyohong;Kim, Mokyoung;Kim, Kidong
    • Korean Journal of Ecology and Environment
    • /
    • v.53 no.4
    • /
    • pp.380-389
    • /
    • 2020
  • Research on diagnosing and predicting the response of ecosystems caused by environmental changes such as artificial disturbance and climate change is emerging as the most important issue of biodiversity and ecosystem researches. This study aims to clean, standardize, and provide the results of National Ecosystem Survey which should be considered fundamentally in diagnosing and predicting ecosystem changes in the form of dataset. To refine and clean the dataset we developed a simple verification program based on the fifth National Ecosystem Survey Guideline and applied that program to the data from the second (1997~2005), third (2006~2013) and fourth (2014~2018) National Ecosystem Survey. Data quality control processes were implemented including (1) standardization of terminology, (2) similar data table integration, (3) unnecessary attribute and error elimination, (4) unification of different input items, (5) data arrangement in codes, and (6) code mapping for input items. These approaches and methods are the first attempt propose an option for ecological data standardization in Korea. The standardized dataset of National Ecosystem Survey in Korea will be easily accessible, reusable for both researchers and public. In addition, we expect it will contribute to the establishment of diverse environmental policies concerning environmental assessments, habitat conservation, prediction of endangered species distribution and ecological risks due to climate change. The dataset through this study is open freely online via EcoBank (nie-ecobank.kr) which is the first ecological information portal system in Korea developed by National Institute of Ecology.

The efficient DC-link voltage design of the Type 4 wind turbine that satisfies HVRT function requirements (HVRT 기능 요구조건을 만족하는 Type 4 풍력 발전기의 효율적인 직류단 전압 설계)

  • Baek, Seung-Hyuk;Kim, Sungmin
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.399-407
    • /
    • 2021
  • This paper proposes the DC-link voltage design method of Type 4 wind turbine that minimizes power loss and satisfies the High Voltage Ride Through(HVRT) function requirements of the transmission system operator. The Type 4 wind turbine used for large-capacity offshore wind turbine consists of the Back-to-Back converter in which the converter linked to the power grid and the inverter linked to the wind turbine share the DC-link. When the grid high voltage fault occurs in the Type 4 wind turbine, if the DC-link voltage is insufficient compared to the fault voltage level, the current controller of the grid-side converter can't operate smoothly due to over modulation. Therefore, to satisfy the HVRT function, the DC-link voltage should be designed based on the voltage level of high voltage fault. However, steady-state switching losses increase further as the DC-link voltage increases. Therefore, the considerations should be included for the loss to be increased when the DC-link voltage is designed significantly. In this paper, the design method for the DC-link voltage considered the fault voltage level and the loss is explained, and the validity of the proposed design method is verified through the HVRT function simulation based on the PSCAD model of the 2MVA Type 4 wind turbine.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Analyses of SGTR Accident With Mihama Unit Experience (미하마 원전경험에 대한 SGTR 사고해석)

  • Lee, S.H.;Kim, K.;Kim, H.J.;Eun, Y.S.
    • Nuclear Engineering and Technology
    • /
    • v.26 no.1
    • /
    • pp.41-53
    • /
    • 1994
  • A SGTR accident postulated at Kori unit 1 is simulated with Mihama unit experience, which occurred on February 1991, to evaluate the capability of plant to cope with the transient. The system design and plant conditions of Kori Unit 1 are much similar with those of Mihama Unit 2. Therefore, special concern has been given to evaluate the sequence and the resulting consequence of the postulated SGTR accident at the Kori unit 1 An analysis is peformed as realistically as possible, with following the EOP of Kori unit 1. The result indicates that the leak through tube break terminates within about forty minutes, and the Kori unit 1 may be sufficient to cope with SGTR accident with same type of sequence. However, the reconsideration may be required for the design of Kori unit 1 which disconnects non-safety AC power from off-site power on SI signal generation. It may be pointed out that the content of EOP for SGTR accident is not enough to require operator's proper judgements. An analysis of SGTR accident tested in the LSTF which simulated the SGTR accident at the Mihama Unit 2 is peformed using the RELAP5/MOD3. The results indicates that the code yields in general good agreement with the test, except the break flowrate at the early stage of the event.

  • PDF

Analysis of the Vent Path Through the Pressurizer Manway Under the Loss of Residual Heat Removal(RHR) System During Mid-Loop Operation in PWR (가압경수로 부분충수 운전중 잔열제거 (RHR)계통 상실시 가압기 통로를 통한 배출유로 특성 분석)

  • Ha, G.S.;Kim, W.S.;Chang, W.P.;Yoo, K.J.
    • Nuclear Engineering and Technology
    • /
    • v.27 no.6
    • /
    • pp.859-869
    • /
    • 1995
  • The present study is to understand the physical phenomena anticipated during the accident with RHR loss under mid-loop operation in a PWR and, at the same time, to examine the prediction capability of RELAP5/MOD3.1 on such an accident, by simulating an integral test relevant to this accident for reliable analysis in an actual PWR. The selected experiment, i.g. BETHSY Test 6.9a, represents the configuration with the pressurizer manway open and steam generators unavailable during the accident. Accordingly, the results of this ok are sure to contribute to understanding both the key events as well as the sensitive parameters, anticipated in the accident, for validity of the actual analysis. In the simulation result overall behavior as well as major phenomena observed in the experiment have been predicted reasonably by RELAP5/MOD3.1, however, the problem associated with enormous computing time .due to small time step size has been encountered. Besides, the code prediction of higher swollen level in the pressure vessel has given rise to overestimation of both pressurizer level and RCS pressure. Subsequently, overprediction of the break flow through the manway has led to earlier core uncovery than that in the experiment by about 400 seconds. As a whole, it is demonstrated from both the experiment and the analysis that gravity feed has not been sufficient to recover the core level and thus additional forced feed has been necessary in this configuration.

  • PDF

Analysis on the Rigid Connections of the Drilled Shaft with the Cap for Multiple Pile Foundations (현장타설말뚝을 적용한 다주식 기초에서 말뚝과 캡의 강결합에 대한 분석)

  • Cho, Sung-Min
    • Journal of the Korean Geotechnical Society
    • /
    • v.24 no.7
    • /
    • pp.61-73
    • /
    • 2008
  • Piles of a bridge pier are connected with the column through the pile cap (footing). Behavior of the pile foundation can be different according to the connection method between piles and the pile cap. Connection methods between pile heads and the pile cap are divided into two groups : rigid connections and hinge connections. Domestic design code has been specified to use rigid connection method for the highway bridge. In the rigid connection method, maximum bending moment of a pile occurs at the pile head and this helps the pile to prevent the excessive displacement. Rigid methods are also good to improve the seismic performance. However, some specifications prescribe that conservative results through investigations of both the fixed-head condition and the free-head condition should be reflected in the design. This statement may induce an over-estimated design for the bridge which has high-quality structures with casing covered drilled shafts and the PC-house contained pile cap. Because the assumption of free-head conditions (hinge connections) is unreal for the elevated pile cap system with multiple piles of the long span sea-crossing bridges. On the other hand, elastic displacement method to evaluate the pile reactions under the pile cap is not suitable for this type of bridges due to impractical assumptions. So, full modeling techniques which analyze the superstructure and the substructure simultaneously should be performed. Loads and stress state of the large diameter drilled shaft and the pile cap for Incheon Bridge which will be the longest bridge of Korea were investigated through the full modeling for rigid connection conditions.

Auditory User Interface Guideline Development for Industrial Sound Design: focused on Function Preference and Sexual Difference (제조업 사운드 디자인을 위한 청각적 사용자 인터페이스 가이드라인 설계: 기능 선호도 및 성별 차이를 중심으로)

  • Yoo, Hoon Sik;Ju, Da Young
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.193-202
    • /
    • 2017
  • With the growth of Chinese manufacturing industry and strengthening of manufacturing industry in advanced countries, the competitiveness of Korean manufacturing industry has become weak. Accordingly, it is time when energy for new growth is required very strongly. This research is the basic research to construct a cognitive and emotional information system to support sound design in manufacturing industry, and aims to develop AUI (Auditory User Interface) guideline. To fulfill research aims, this research conducted interviews to persons belonging to the manufacturing industry, and analyzed contexts and major characteristics related with AUI design. In addition, this research conducted survey on 269 persons on user preference on representative function of products. By analyzing survey data, this research examined the most suitable melody method for each sound, and difference in user preference between men and women. Based on beep sound, it performed analysis focusing on the number of sounds, melody types, and code. It also extracted AUI guidelines usable when users of the product into male and female. This research has significance in the sense that it built the basic guide data which can support AUI design in manufacturing industry.

The Relationship between Transgressive Behaviors of Humanity and Moral Anger in Korean Culture ('사람됨' 준거 위반과 도덕적 정서로서의 화(火)의 관계 분석)

  • Kibum Kim ;Hyojin Im
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.3
    • /
    • pp.1-21
    • /
    • 2005
  • Many researches have argued the most important dimension of perception or evaluation of person is morality and competence in Korean culture. This study was to investigate the cultural characteristics of the criteria of personhood. Two studies were conducted to investigate the criteria used to evaluate person by qualitative approach and the differences of evaluation of wrongdoer who violates interpersonal norm or individual autonomy by experimental method. In addition, anger as emotional response to wrongdoer is conceptualized in terms of moral and self-conscious emotion. Expression of anger is less an outpouring of emotion and more a culturally regulated and normative mode of managing and putting into practice our society's system of rights and obligations - its moral code. According to results of qualitative data by interview and focus group interview, the most important criteria used to evaluate personhood was interpersonal concern, esp, expectation and norm. The results of experiment revealed that violation of interpersonal norm domain evoked angrier towards violator than autonomy domain. The subjects ascribed more blame and responsibility to interpersonal norm violator than autonomy keeper. Also function of behavior inhibition of anger was higher in interpersonal norm domain than autonomy domain.