• Title/Summary/Keyword: memory protection

Search Result 160, Processing Time 0.025 seconds

Conceptual Design of High Speed Data Processing Unit for Next Generation Satellite (차세대 인공위성용 고속데이터 처리유닛 개념설계)

  • Oh, Dae-Soo;Seo, In-Ho;Lee, Jong-Ju;Park, Hong-Young;Chung, Tae-Jin;Kim, Hyung-Myung;Park, Jong-Oh;Yoon, Jong-Jin;Cha, Kyung-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.6
    • /
    • pp.616-620
    • /
    • 2008
  • High reliability is the important parameter on designing satellite system and it is also important to design hish speed data processing unit. To make high speed satellite processing unit, it is needed to utilize space processor, high speed data interface technology, mass memory control technology and data protection technology under space radiation environment.

Countermeasures to the Vulnerability of the Keyboard Hardware (키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.187-194
    • /
    • 2008
  • This paper proposes an effective countermeasure to an intrinsic hardware vulnerability of the keyboard controller that causes sniffing problem on the password authentication system based on the keyboard input string. Through the vulnerability, some possible attacker is able to snoop whole the password string input from the keyboard even when any of the existing keyboard protection software is running. However, it will be impossible for attackers to gather the exact password strings if the proposed policy is applied to the authentication system though they can sniff the keyboard hardware protocol. It is expected that people can use secure Internet commerce after implementing and applying the proposed policy to the real environment.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

Development of Collision Safety Control Logic using ADAS information and Machine Learning (머신러닝/ADAS 정보 활용 충돌안전 제어로직 개발)

  • Park, Hyungwook;Song, Soo Sung;Shin, Jang Ho;Han, Kwang Chul;Choi, Se Kyung;Ha, Heonseok;Yoon, Sungroh
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.3
    • /
    • pp.60-64
    • /
    • 2022
  • In the automotive industry, the development of automobiles to meet safety requirements is becoming increasingly complex. This is because quality evaluation agencies in each country are continually strengthening new safety standards for vehicles. Among these various requirements, collision safety must be satisfied by controlling airbags, seat belts, etc., and can be defined as post-crash safety. Apart from this safety system, the Advanced Driver Assistance Systems (ADAS) use advanced detection sensors, GPS, communication, and video equipment to detect the hazard and notify driver before the collision. However, research to improve passenger safety in case of an accident by using the sensor of active safety represented by ADAS in the existing passive safety is limited to the level that utilizes the sudden braking level of the FCA (Forward Collision-avoidance Assist) system. Therefore, this study aims to develop logic that can improve passenger protection in case of an accident by using ADAS information and driving information secured before a collision. The proposed logic was constructed based on LSTM deep learning techniques and trained using crash test data.

Forgetting Stories from the Islands, Jeju and Calauit

  • Raymon D. Ritumban
    • SUVANNABHUMI
    • /
    • v.16 no.1
    • /
    • pp.103-123
    • /
    • 2024
  • The traumatic experiences of people from peripheral islands are susceptible to mnemocide. Such erasure of memory is facilitated by "defensive and complicit forgetting," which, according to Aleida Assmann, leads to "protection of perpetrators." My paper reflects on the vulnerability of traumas from the islands to mnemocide by looking into [1] the massacre of communists and civilians on Jeju Island, South Korea in 1948 as described in Hyun-Kil Un's short story "Dead Silence" (2017; English trans.) and [2] the eviction of residents and indigenous people from Calauit Island, Philippines for the creation of a safari in 1976 as imagined in Annette A. Ferrer's "Pablo and the Zebra" (2017). In "Dead Silence," I direct the attention to how to the execution of the villagers-witnesses to the death of the communist guerillas-is a three-pronged violence: it is a transgression committed against the innocent civilians; an act of "erasing traces to cover up" the military crackdown on the island; and, by leaving the corpses out in the open, a display of impunity. In "Pablo and the Zebra," I second that both residents (i.e., humans and animals) experience post-traumatic stress because of their respective displacements; thus, the tension between them has got to stop. Curiously, while it concludes with a reconciliatory gesture between an elder and a zebra, no character demanded a reparation for their traumatic past per se. Could the latter be symptomatic of a silence that lets such violence "remain concealed for a long time"?

An indoor localization system for estimating human trajectories using a foot-mounted IMU sensor and step classification based on LSTM

  • Ts.Tengis;B.Dorj;T.Amartuvshin;Ch.Batchuluun;G.Bat-Erdene;Kh.Temuulen
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.37-47
    • /
    • 2024
  • This study presents the results of designing a system that determines the location of a person in an indoor environment based on a single IMU sensor attached to the tip of a person's shoe in an area where GPS signals are inaccessible. By adjusting for human footfall, it is possible to accurately determine human location and trajectory by correcting errors originating from the Inertial Measurement Unit (IMU) combined with advanced machine learning algorithms. Although there are various techniques to identify stepping, our study successfully recognized stepping with 98.7% accuracy using an artificial intelligence model known as Long Short-Term Memory (LSTM). Drawing upon the enhancements in our methodology, this article demonstrates a novel technique for generating a 200-meter trajectory, achieving a level of precision marked by a 2.1% error margin. Indoor pedestrian navigation systems, relying on inertial measurement units attached to the feet, have shown encouraging outcomes.

Significance and Limitation of the Guiding Principles for the Preparation of Nominations Concerning Sites of Memory Associated with Recent Conflicts (최근 갈등과 관련된 기억유산의 등재 준비를 위한 지침원칙의 의의와 한계)

  • HEO Sujin
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.162-182
    • /
    • 2024
  • Since the adoption of the World Heritage Convention, sites associated with dark histories have been inscribed as World Heritage sites over the past fifty years. However, in 2018, the review of nomination dossiers for these sites was temporarily suspended to prevent additional discomfort or the conflicts these inscriptions might cause. Despite concerns raised by experts about nominations of these sites, the increasing demands from State Parties led to the adoption of the Guiding Principles for the Preparation of Nominations Concerning Sites of Memory Associated with Recent Conflicts. These Guiding Principles have made it possible to inscribe such sites as World Heritage sites. The Guiding Principles play a crucial role in outlining the nature and criteria for inscription, the components required in the nomination dossier, and mechanisms for notifying a contestation in cases of differing interpretations of the site. Their primary aim is to minimize further conflicts that may arise from the inscription of sites of memory. They affirm that such sites can contribute to achieving the objectives of the World Heritage Convention and represent a significant step in addressing heritage interpretation in the World Heritage system. The amendment of the Operational Guidelines to incorporate a contestation mechanism has arguably established a more transparent and open inscription process. However, the Guiding Principles also have limitations. Among the ten criteria set by the World Heritage Convention, sites related to conflicts or dark histories can use Criterion (vi). This criterion focuses on the site's outstanding universal value linked to historical events or associations, regardless of physical evidence. If a State Party chooses not to use Criterion (vi), the application of the Guiding Principles cannot be expected. Furthermore, while the Guiding Principles require a heritage interpretation strategy in the nomination dossier, the lack of detailed guidance may confuse nominating countries. Sites of memory associated with recent conflicts are not just places that need protection and remembrance due to their association with dark histories. They have also evolved to become spaces for reconciliation and healing. The inscription of these sites as World Heritage sites is not just a recognition of their historical significance, but also a platform for discussing the impact of past conflicts on modern society. It opens up a dialogue on how current generations can address these issues. With the adoption of the Guiding Principles, we hope that inscribed sites will not only promote reconciliation and healing but also serve as a starting point for addressing present and future challenges.

An Experimental Study of Effect on ECV 304 Cells, Platelet Rich Plasma and Rats treated with L-NAME by Boonsimgieum extract (분심기음(分心氣飮)이 고혈압 백서와 인간유래 혈관내피세포주(ECV 304)에 미치는 영향에 대한 연구)

  • Jeon, Yeon-Yi;Park, Chang-Gook;Lee, So-Yeon;Yoon, Hyeon-Deok;Shin, Wo-Cheol;Park, Chi-Sang
    • The Journal of Internal Korean Medicine
    • /
    • v.26 no.1
    • /
    • pp.182-198
    • /
    • 2005
  • Object : This study was designed to research whether the protection and inhibitory effects of cardiovascular diseases in L-NAME induced rat or ECV 304 cell lines through the Cell morphological pattern, Tunel assay, LDH activity, heart rate, blood pressure and immunohistochemistric analysis by Boonsimgieum water extract Methods : Nitric oxide(NO) play an important role in normal and pathophysiological cells including as a messenger molecule, neurotransmitter, microbiocidal agent, or dilator of blood vessels and artheriosclerosis, hypertension, myocardial infarction, respectively. Endothelial cell products can modulate the magnitude of a response to a vasoconstrictor, as evinced by the greater constriction after endothelium removal or NO synthesis blockade. To investigate that Boonsimgieum in the potential contribution of the levels of nitric oxide generated by endothelial nitric oxide synthase (eNOS) and the mechanisms of protection against NG-nitro-L-arginine methyl ester (L-NAME), human ECV 304 cells, which normally do not express eNOS, were expressed by L-NAME. L-NAME stimulated rat or cells were found to be resistant to injury and delayed death following the Boonsimgieum. Inhibition of nitric oxide synthesis abolished the protective effect against L-NAME, thrombin and collagen exposure. Interestingly, such effects have been observed during stimulation with agents such as phenylephrine and KCl on L-NAME mediate rats, were damaged by the NOS inhibitor L-NAME. Result : As the result of this study, In group, the anti-apoptosis and necrosis in the cardiovascular system have a potential capacity for prevented, protected and treating the diseases of cardiovascular system, against the necrosis of rat and ECV 304 cells with Caspase 3 and calpain expression by L-NAME is promoted. Conclusion : these results demonstrate neuroprotective and memory enhancing effects of ZIBU, suggesting its beneficial actions for the treatment of AD.

  • PDF

A Study on Legal Regulation of Neural Data and Neuro-rights (뇌신경 데이터의 법적 규율과 뇌신경권에 관한 소고)

  • Yang, Ji Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.3
    • /
    • pp.145-178
    • /
    • 2020
  • This paper examines discussions surrounding cognitive liberty, neuro-privacy, and mental integrity from the perspective of Neuro-rights. The right to control one's neurological data entails self-determination of collection and usage of one's data, and the right to object to any way such data may be employed to negatively impact oneself. As innovations in neurotechnologies bear benefits and downsides, a novel concept of the neuro-rights has been suggested to protect individual liberty and rights. In Oct. 2020, the Chilean Senate presented the 'Proyecto de ley sobre neuroderechos' to promote the recognition and protection of neuro-rights. This new bill defines all data obtained from the brain as neuronal data and outlaws the commerce of this data. Neurotechnology, especially when paired with big data and artificial intelligence, has the potential to turn one's neurological state into data. The possibility of inferring one's intent, preferences, personality, memory, emotions, and so on, poses harm to individual liberty and rights. However, the collection and use of neural data may outpace legislative innovation in the near future. Legal protection of neural data and the rights of its subject must be established in a comprehensive way, to adapt to the evolving data economy and technical environment.

Energy harvesting techniques for remote corrosion monitoring systems

  • Kim, Sehwan;Na, Ungjin
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.555-567
    • /
    • 2013
  • An Remote Corrosion Monitoring (RCM) system consists of an anode with low potential, the metallic structures against corrosion, an electrode to provide reference potential, and a data-acquisition system to ensure the potential difference for anticorrosion. In more detail, the data-acquisition (DAQ) system monitors the potential difference between the metallic structures and a reference electrode to identify the correct potential level against the corrosion of the infrastructures. Then, the measured data are transmitted to a central office to remotely keep track of the status of the corrosion monitoring (CM) system. To date, the RCM system is designed to achieve low power consumption, so that it can be simply powered by batteries. However, due to memory effect and the limited number of recharge cycles, it can entail the maintenance fee or sometimes cause failure to protect the metallic structures. To address this issue, the low-overhead energy harvesting circuitry for the RCM systems has designed to replenish energy storage elements (ESEs) along with redeeming the leakage of supercapacitors. Our developed energy harvester can scavenge the ambient energy from the corrosion monitoring environments and store it as useful electrical energy for powering local data-acquisition systems. In particular, this paper considers the energy harvesting from potential difference due to galvanic corrosion between a metallic infrastructure and a permanent copper/copper sulfate reference electrode. In addition, supercapacitors are adopted as an ESE to compensate for or overcome the limitations of batteries. Experimental results show that our proposed harvesting schemes significantly reduce the overhead of the charging circuitry, which enable fully charging up to a 350-F supercapacitor under the low corrosion power of 3 mW (i.e., 1 V/3 mA).