• Title/Summary/Keyword: collision attack

Search Result 44, Processing Time 0.03 seconds

Virtual Reality Game Modeling for a Haptic Jacket

  • Bae, Hee-Jung;Jang, Byung-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.882-885
    • /
    • 2003
  • In this paper, we describe a haptic jacket and wheel as a haptic interface to enhance VR game realism. Building upon the VR game system using this devices, our haptic interface technique allows the user to intuitive interact on game contents, and then to sense the game event properties such as walking, attacking, driving and fire in a natural way. In addition, we extended the initial haptic model to support haptic decoration and dynamic interactions due to the added game event in a real time display. An application example presented here is a VR Dino-Attack game. This game supports interactions among dynamic and our intuitive haptic interface. Modeling physic interactions involves precise collision detection, real-time force computation, and high control-loop bandwidth.

  • PDF

Study on Prediction for Prompt Countermeasures to Oil Spread in Ocean (해안기름유출사고에 의한 기름확산 예측 방법 연구)

  • Kim, Young-Bok
    • Journal of Ocean Engineering and Technology
    • /
    • v.25 no.2
    • /
    • pp.108-112
    • /
    • 2011
  • When oil spills occur in the ocean because of a ship collision or grounding, the oil in the sea will spread to the coastline. To effectively and promptly prevent such an oil spread, the prediction of the direction and speed of the spreading oil must be made. By applying the coastal wave diffusion theory with a consideration of the effects of wind and current, the oil spreading direction and speed can be predicted promptly so that the National Disaster Prevention System can effectively and promptly take countermeasures against the attack and contamination of the coastline by such oil bands.

Development and Validation of Automatic Thrust Control System (자동추력 제어시스템 개발 및 검증)

  • Kim, Chong-Sup;Cho, In-Je;Lee, Dong-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.9
    • /
    • pp.905-912
    • /
    • 2010
  • Modern version of advanced supersonic fighter have ATCS (Automatic Thrust Control System) to maximum flight safety, fuel efficiency and mission capability the integrated advanced autopilot system such as TFS (Terrain Following System), GCAS (Ground Collision Avoidance System) and AARS (Automatic Attitude Recovery System) and etc. This paper addresses the design and verification of ATCS based on advanced supersonic trainer in HILS (Hardware In the Loop Simulator) with minimum hardware modification to reduce of development cost and maintain of system reliability. The function of ATCS is consisted of target speed hold mode in UA (Up and Away) and angle of attack hold mode in PA (Power Approach). The real-time pilot evaluation reveals that pilot workload is minimized in cruise and approach flight stage by ATCS.

Collision Attack of a Hash Function based on 2D Cellular Automata (이차원 셀룰라 오토마타 기반 해쉬함수에 대한 충돌쌍 공격)

  • Choi, Joon-Geun;Ryu, Han-Seong;Lee, Je-Sang;Hong, Seok-Hie
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.81-84
    • /
    • 2008
  • 김재겸은 2005년 한국 멀티미디어 학회 논문지에 새로운 이차원 셀룰라 오토마타 설계 방법을 소개하고 이 설계 방법으로 구성된 이차원 셀룰라 오토마타를 이용한 해쉬함수를 제안하였다. 본 논문에서는 이 해쉬함수에 대한 첫 번째 분석 결과를 소개한다. 이 해쉬함수는 8 라운드로 구성되고 한 라운드는 두 개의 비선형 연산 부분을 포함하고 있으며, 메시지는 두 비선형 연산 부분에 모두 사용된다. 메시지 차분이 비선형 연산 부분을 거친 뒤 사라질 확률은 $2^{-14}$이다. 따라서 1 라운드 후 약 $2^{-28}$의 확률로 이 해쉬함수의 충돌쌍을 찾을 수 있다. 본 논문의 분석 결과를 통하여 이 해쉬함수는 매우 취약함을 알 수 있다.

  • PDF

A Study on Enhancing Hash Function Security against Collision Search Attack (충돌쌍 탐색 공격에 대한 해쉬 함수 안전성 강화에 관한 연구)

  • Jeong, Eun-Jin;Han, Jeong-Hoon;Kim, Seung-Joo;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1120-1123
    • /
    • 2008
  • 단방향 암호화 함수인 해쉬 함수는 2005년 Wang의 새로운 공격법이 발표되면서 안전성에 대한 문제점이 조금씩 드러나기 시작하고 있다. Wang의 새로운 차분 공격법은 현재 가장 널리 사용하고 있는 해쉬 알고리즘인 SHA-1을 이론적으로 $2^{69}$의 계산으로 충돌을 찾을 수 있다고 하였다. 본 논문에서는 차분 공격이 이루어지는 방법과 Wang의 차분 공격이 지니는 두 가지 특성에 대해서 연구하였고, MDx계열의 해쉬 함수의 안전성에 대한 기존의 제시된 해결책과 다른, 한 블록의 모든 워드 값을 변형 처리한 방식을 제안한다.

PASEM을 이용한 KSR-III Nose Fairing 분리운동 예측

  • Ok, Ho-Nam;Kim, In-Sun;Ra, Sung-Ho;Kim, Seong-Lyong;Oh, Beom-Suk
    • Aerospace Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.171-181
    • /
    • 2003
  • The nose fairings of KSR-III are designed to be separated from the rocket by explosive force at the mission altitude to expose the payload. Adequate amount of separation force should be imposed to allow safe separation without collision between the fairings and the rocket, and the separation device was designed for the separation at very high altitude where almost no air load was expected. As the development of KSR-III goes on, several design changes have made and lower separation altitude of 45km is expected as a result. Under these circumstances, it is required to determine if the nose fairings can be separated without collision with much severer air load than for the design condition. In this study, the 6-DOF motion analysis program, PASEM, which was developed to predict the strap-on booster separation, is modified to simulate the pivotal motion of the fairings at early stages of separation. The accuracy of pivot motion simulation is validated by comparison with the results of ground test and the accurate separation conditions are deduced from it. Trajectory simulations are performed to see if separation without collision is possible with varying angle of attack, direction of gravity, and the effect of gust. It is also found that reducing the separation angle of the clamshell hinge from 60 degrees to 40 degrees can enhance separation safety and separation at lower altitude of 40km can be done without collision.

  • PDF

A STUDY ON HASH FUNCTIONS

  • Yang, Jeong-Mo
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.13 no.2
    • /
    • pp.87-98
    • /
    • 2001
  • In this paper, we study hash function, which will take a message of arbitrary length and produce a massage digest of a specified size. The message digest will then be signed. We have to be careful that the use of a hash function h does not weaken the security of the signature scheme, for it is the message digest that is signed, not the message. It will be necessary for h to satisfy certain properties in order to prevent various forgeries. In order to prevent various type of attack, we require that hash function satisfy collision-free property. In section 1, we introduce some definitions and collision-free properties of hash function. In section 2, we study a discrete log hash function and introduce the main theorem as follows : Theorem Suppose $h:X{\rightarrow}Z$ is a hash function. For any $z{\in}Z$, let $$h^{-1}(z)={\lbrace}x:h(x)=z{\rbrace}$$ and denote $s_z={\mid}h^{-1}(z){\mid}$. Define $$N={\mid}{\lbrace}{\lbrace}x_1,x_2{\rbrace}:h(x_1)=h(x_2){\rbrace}{\mid}$$. Then (1) $\sum\limits_{z{\in}Z}s_z={\mid}x{\mid}$ and the mean of the $s_z$'s is $\bar{s}=\frac{{\mid}X{\mid}}{{\mid}Z{\mid}}$ (2) $N=\sum\limits_{z{\in}Z}{\small{s_z}}C_2=\frac{1}{2}\sum\limits_{z{\in}Z}S_z{^2}-\frac{{\mid}X{\mid}}{2}$. (2) $\sum\limits_{z{\in}Z}(S_z-\bar{s})^2=2N+{\mid}X{\mid}-\frac{{\mid}X{\mid}^2}{{\mid}Z{\mid}}$.

  • PDF

Analysis of Crash Potential by Vehicle Interactions Using Driving Simulations (주행 시뮬레이션을 이용한 차량간 상호작용에 따른 사고발생가능성 분석)

  • Kim, Yunjong;Oh, Cheol;Park, Subin;Choi, Saerona
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.98-112
    • /
    • 2018
  • Intentional aggressive driving (IAD) is a very dangerous driving behavior that threatens to attack the adjacent vehicles. Most existing studies have focused on the independent driving characteristics of attack drivers. However, the identification of interactions between the offender and the victim is necessary for the traffic safety analysis. This study established multi-agent driving simulation environments to systematically analyze vehicle interactions in terms of traffic safety. Time-to-collision (TTC) was adopted to quantify vehicle interactions in terms of traffic safety. In addition, a exponential decay function was further applied to compare the overall pattern of change in crash potentials when IAD events occurred. The outcome of this study would be useful in developing policy-making activities to enhance traffic safety by reducing dangerous driving events including intentional aggressive driving.

Performance Analysis of DoS Security Algorithm for Multimedia Contents Services (멀티미디어 콘텐츠의 서비스거부 방지 알고리즘 성능분석)

  • Jang, Hee-Seon;Shin, Hyun-Chul;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.19-25
    • /
    • 2010
  • In this paper, the performance of the DoS information security algorithm is evaluated to provide the multimedia traffic between the nodes using the multicasting services. The essence technology for information security to distribute the multimedia contents is presented. Under the multicasting services, a node participating new group needs a new address and the node compares the collision with the existing nodes, then DoS attack can be occurred between the nodes by a malicious node. Using the NS2 simulator, the number of DoS attacks, the average number of trials to generate new address, and the average time to create address are analyzed. From simulation results, the efficient algorithm with relevant random number design according to the DRM network is needed to provide secure multimedia contents distribution.

Design and Performance Analysis of Ducted Propulsor for Underwater Robot (수중로봇용 덕트 추진기의 설계 및 성능해석)

  • Kim, Kyung-Jin;Lee, Doo-Hyoung;Park, Warn-Gyu;Park, Han-Il
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.6
    • /
    • pp.39-45
    • /
    • 2012
  • Underwater robots are generally used for the construction of seabed structures, deep-sea ecosystem research, ocean energy development, etc. A ducted marine propulsor is widely used for the thruster of an underwater robot because of its collision protection, efficiency increase, cavitation reduction, etc. However, the flow of a ducted propeller is very complex because it involves strong flow interactions between the blade impeller and duct. The present work aimed to design a ducted propeller using 2-D strip theory and CFD analysis. The hydrodynamic forces (i.e. and ) were computed to set the local angle of attack in a spanwise direction of the propeller blade. After the propeller design, performance coefficients such as the thrust, torque, and efficiency were computed to check whether the designed performance was achieved. To validate the present analysis, the thrust was compared with experimental data and good agreement was obtained.