• Title/Summary/Keyword: journal traces

Search Result 1,013, Processing Time 0.026 seconds

Importance and Application of Ichnology (생흔학의 중요성 및 활용)

  • Kim, Jong-Kwan;Chun, Seung-Soo;Baek, Young-Sook;Chang, Eun-Kyong;Shin, Sun-Ja
    • The Korean Journal of Petroleum Geology
    • /
    • v.12 no.1
    • /
    • pp.34-42
    • /
    • 2006
  • Ichnology is the study of traces made by various organisms, which includes classification and description of traces, and interpretation of sedimentary process, behavior of organism and depositional environment based on traces and organism behavior. Ichnofacies, which is defined as the association of several traces related together with substrate characteristics and sedimentary processes, is closely related to depositional environment. Ichnology has been applied to sedimentology (to understand physical characteristics of depositional environment, sedimentation pattern and event bed), sequence stratigraphy (to recognize sequence boundaries and biostratigraphic discontinuities such as MFS, TSE and RSE), oil exploration (providing of many information without big cost) and palaeocology. Preliminary ichnological study on the Ganghwa intertidal flat shows that dominant ichofacies are changing with season and location, suggesting that their seasonal variation would be a good indicator to understand the seasonal change of sedimentary processes, the small- scale change of sedimentary environment and the preservation potential of such units. Ichnology on intertidal flat in western coast of Korea has a great potential to apply its results to petroleum geology as well as sedimentology.

  • PDF

An Improved Horizontal Correlation Analysis Using Collision Characteristics on Lookup Table Based Scalar Multiplication Algorithms (참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석)

  • Park, Dongjun;Lee, Sangyub;Cho, Sungmin;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.179-187
    • /
    • 2020
  • The FBC(Fixed-Base Comb) is a method to efficiently operate scalar multiplication, a core operation for signature generations of the ECDSA(Elliptic Curve Digital Signature Algorithm), utilizing precomputed lookup tables. Since the FBC refers to the table depending on the secret information and the values of the table are publicly known, an adversary can perform HCA(Horizontal Correlation Analysis), one of the single trace side channel attacks, to reveal the secret. However, HCA is a statistical analysis that requires a sufficient number of unit operation traces extracted from one scalar multiplication trace for a successful attack. In the case of the scalar multiplication for signature generations of ECDSA, the number of unit operation traces available for HCA is significantly fewer than the case of the RSA exponentiation, possibly resulting in an unsuccessful attack. In this paper, we propose an improved HCA on lookup table based scalar multiplication algorithms such as FBC. The proposed attack improves HCA by increasing the number of unit operation traces by determining such traces for the same intermediate value through collision analysis. The performance of the proposed attack increases as more secure elliptic curve parameters are used.

Habitat Suitability Assessment of the Saemangeum Lake Area for Eurasian Otter(Lutra lutra) and Correlation Analysis with Spatial Variables (새만금호 일대 수달의 서식적합성 평가 및 공간변수와의 상관성 분석)

  • Shin, Hwa-Yong;Shin, Gee-Hoon;Han, Sung-Yong;Rho, Paikho;Lee, Joon-Woo
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.4
    • /
    • pp.298-306
    • /
    • 2020
  • This study was conducted to examine the impact of the correlation between habitat suitability of the Saemangeum lake area for otters and spatial variables (watersides, wetlands, farmlands, urban areas, roads, etc.) on the inhabitation of otters. As a result of the habitat suitability analysis, it was found that 380grids of 1097 grids (34.6%) studied are most suitable and suitable, whereas 413 grids of 1097 grids (37.7%) of the total are marginal and unsuitable. Comparatively analyzing otter traces data against for each spatial variable in the Saemangeum area revealed that the distance to the road or man-made areas is directly proportional to the number of otter traces, while more traces of otters were found areas close to waters. Despite the impact from the internal construction of Saemangeum lake, there found 2 to 6 times more otter traces in the area farthest from the urban areas and roads compared to the area nearest to the urban areas and roads. Thus, when restoring habitats for otters, a minimum of 500(m) distance to roads or urban areas, which can be considered as a threat to the habitats, must be secured.

Soccer Game Analysis I : Extraction of Soccer Players' ground traces using Image Mosaic (축구 경기 분석 I : 영상 모자익을 통한 축구 선수의 운동장 궤적 추출)

  • Kim, Tae-One;Hong, Ki-Sang
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.1
    • /
    • pp.51-59
    • /
    • 1999
  • In this paper we propose the technique for tracking players and a ball and for obtaining players' ground traces using image mosaic in general soccer sequences. Here, general soccer sequences mean the case that there is no extreme zoom-in or zoom-out of TV camera. Obtaining player's ground traces requires that the following three main problems be solved. There main problems: (1) ground field extraction (2) player and ball tracking and team indentification (3) player positioning. The region of ground field is extracted on the basis of color information. Players are tracked by template matching and Kalman filtering. Occlusion reasoning between overlapped players in done by color histogram back-projection. To find the location of a player, a ground model is constructed and transformation between the input images and the field model is computed using four or more feature points. But, when feature points extracted are insufficient, image-based mosaic technique is applied. By this image-to-model transformation, the traces of players on the ground model can be determined. We tested our method on real TV soccer sequence and the experimental results are given.

  • PDF

Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘 확산계층에서 낮은 복잡도를 갖는 부채널 분석)

  • Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.993-1000
    • /
    • 2017
  • When the availability of embedded device is considered, combined countermeasure such as first-order masking and hiding countermeasures is quite attractive because the security and efficiency can be provided at the same time. Especially, combined countermeasure can be applied to the confusion and diffusion layers of the first and last rounds in order to provide the efficiency. Also, the middle rounds only employs first-order masking countermeasure or no countermeasure. In this paper, we suggest a novel side channel analysis with low complexity in the output of diffusion layer. In general, the attack target cannot be set to the output of diffusion layer owing to the high complexity. When the diffusion layer of block cipher is composed of AND operations, we show that the attack complexity can be reduced. Here, we consider that the main algorithm is SEED. Then, the attack complexity with $2^{32}$ can be reduced by $2^{16}$ according to the fact that the correlation between the combination of S-box outputs and that of the outputs of diffusion layer. Moreover, compared to the fact that the main target is the output of S-box in general, we demonstrate that the required number of traces can be reduced by 43~98% in terms of simulated traces. Additionally, we show that only 8,000 traces are enough to retrieve the correct key by suggested scheme, although it fails to reveal the correct key when performing the general approach on 100,000 traces in realistic device.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Development of expressway mode (고속도로 주행 모우드의 개발연구)

  • Park, Sun
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.6 no.1
    • /
    • pp.63-70
    • /
    • 1984
  • The KIER expressway mode was constructed from actual speed-versus-time traces generated by an instrumented test car driven a variety of expressways. This mode reflects the correct proportion of operation on each of the six expressways and preserves the non-steady-state characteristics of real driving. The average speed of the mode is 79.43 km/h and the mode length is 16.22 km.

  • PDF

A study on output feedback control (출력궤환제어에 대한 연구)

  • 심영철
    • 전기의세계
    • /
    • v.30 no.2
    • /
    • pp.86-96
    • /
    • 1981
  • The problem of incomplet state feedback began to appear late in60's and early in 70's. This was motivated by inability to measure all the states of the system in practice. This survey paper traces the early developments in the subject through to the most recent achievement of gain-determining, pole-assignment, stabilization, and low sensitivity system design with output feedback.

  • PDF

Multi-Round CPA on Hardware DES Implementation (하드웨어 DES에 적용한 다중라운드 CPA 분석)

  • Kim, Min-Ku;Han, Dong-Guk;Yi, Ok-Yeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.74-80
    • /
    • 2012
  • Recently at SCIS2011, Nakatsu et. al. proposed multi-round Correlation Power Analysis(CPA) on Hardware Advanced Encryption Standard(AES) to improve the performance of CPA with limited number of traces. In this paper, we propose, Multi-Round CPA to retrieve master key using CPA of 1round and 2round on Hardware DES. From the simulation result for the proposed attack method, we could extract 56-bit master key using the 300 power traces of Hardware DES in DPA contes. And it was proved that we can search more master key using multi-round CPA than using single round CPA in limited environments.