• Title/Summary/Keyword: replay

Search Result 317, Processing Time 0.019 seconds

Development of the PC Based Color Fish Finder (퍼스널 컴퓨터를 이용한 칼라 어군탐지기의 개발에 관한 연구)

  • 신현옥
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.31 no.3
    • /
    • pp.247-255
    • /
    • 1995
  • This paper describes a personal computer(PC) based color fish finder to improve some problem of the commercial one. The commercial fish finder has no function of the echo data logging and replaying. The authors developed two types of the PC based color fish finder. One is a master type composed of a PC, a digital input-output board, and analog to digital converting (A/D) board and an ultrasonic transceiver unit, the other is a slave type composed of a PC and an A/D board. To test the performances of the master type experiments were carried out in air and in a water tank. It is found that the designed master type fish finder displays very well an eight-colored echogram by one dot resolution to the left side of the PC monitor. Also, the depth of echo signal was corresponds very well to the range from the transducer to a target. The sampling interval of echo signal is about 0.1m and the time of A/D conversion is 30 $\mu$sec. On the other hand, to test the performances of the slave type a raw data of echo signals from a data logger was supplied directly or via RF transceivers to the slave type one. From this experiment, it is confirmed the slave type is useful to replay the echo signal from the data logger or a telesounder.

  • PDF

FlaSim: A FTL Emulator using Linux Kernel Modules (FlaSim: 리눅스 커널 모듈을 이용한 FTL 에뮬레이터)

  • Choe, Hwa-Young;Kim, Sang-Hyun;Lee, Seoung-Won;Park, Sang-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.836-840
    • /
    • 2009
  • Many researchers have studied flash memory in order to replace hard disk storages. Many FTL algorithms have been proposed to overcome physical constraints of flash memory such as erase-before-write, wear leveling, and poor write performance. Therefore, these constraints should be considered for testing FTL algorithms and the performance evaluation of flash memory. As doing the experiments, we suffer from several problems with costs and settings in experimental configuration. When we, for example, replay the traces of Oracle to evaluate the I/O performance with flash memory, it is hard to extract exact traces of I/O operations in Oracle. Since there are only write operations in the log, it is impossible to gather read operations. In MySQL and SQLite, we can gather the read operations by changing I/O functions in the source codes. But it is not easy to search for the exact points about I/O and even if we can find out the points, we might get wrong results depending on how we modify source codes to get I/O traces. The FlaSim proposed in this paper removes the difficulties when we evaluate the performance of FTL algorithms and flash memory. Our Linux drivers emulate the flash memory as a hard disk. And we can easily obtain the usage statistics of flash memory such as the number of write, read, and erase operations. The FlaSim can be gracefully extended to support the additional modules implemented by novel algorithms and ideas. In this paper, we describe the structure of FTL emulator, development tools and operating methods. We expect this emulator to be helpful for many experiments and research with flash memory.

A STUDY ON THE ARMILLARY SPHERE OF TONGCHEON-UI DESCRIBED BY HONG DAE-YONG (홍대용 통천의의 혼천의 연구)

  • MIHN, BYEONG-HEE;YUN, YONG-HYUN;KIM, SANG HYUK;KI, HO CHUL
    • Publications of The Korean Astronomical Society
    • /
    • v.36 no.3
    • /
    • pp.79-95
    • /
    • 2021
  • This study aims to develop a restoration model of an armillary sphere of Tongcheon-ui (Pan-celestial Armillary Sphere) by referring to the records of Damheonseo (Hong Dae-Yong Anthology) and the artifact of an armillary sphere in the Korean Christian Museum of Soongsil University. Between 1760 and 1762, Hong, Dae-Yong (1731-1783) built Tongcheon-ui, with Na, Kyung-Jeok (1690-1762) designing the basic structure and Ann, Cheo-In (1710-1787) completing the assembly. The model in this study is a spherical body with a diameter of 510 mm. Tongcheon-ui operates the armillary sphere by transmitting the rotational power from the lantern clock. The armillary sphere is constructed in the fashion of a two-layer sphere: the outer one is Yukhab-ui that is fixed; and the inner one, Samsin-ui, is rotated around the polar axis. In the equatorial ring possessed by Samsin-ui, an ecliptic ring and a lunar-path ring are successively fixed and are tilted by 23.5° and 28.5° over the equatorial ring, respectively. A solar miniature attached to a 365-toothed inner gear on the ecliptic ring reproduces the annual motion of the Sun. A lunar miniature installed on a 114-toothed inner gear of the lunar-path ring can also replay the moon's orbital motion and phase change. By the set of 'a ratchet gear, a shaft and a spur gear' installed in the solstice-colure double-ring, the inner gears in the ecliptic ring and lunar-path ring can be rotated in the opposite direction to the rotation of Samsin-ui and then the solar and lunar miniatures can simulate their revolution over the period of a year and a month, respectively. In order to indicate the change of the moon phases, 27 pins were arranged in a uniform circle around the lunar-path ring, and the 29-toothed wheel is fixed under the solar miniature. At the center of the armillary sphere, an earth plate representing a world map is fixed horizontally. Tongcheon-ui is the armillary sphere clock developed by Confucian scholars in the late Joseon Dynasty, and the technical level at which astronomical clocks could be produced at the time is of a high standard.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Metadata extraction using AI and advanced metadata research for web services (AI를 활용한 메타데이터 추출 및 웹서비스용 메타데이터 고도화 연구)

  • Sung Hwan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.499-503
    • /
    • 2024
  • Broadcasting programs are provided to various media such as Internet replay, OTT, and IPTV services as well as self-broadcasting. In this case, it is very important to provide keywords for search that represent the characteristics of the content well. Broadcasters mainly use the method of manually entering key keywords in the production process and the archive process. This method is insufficient in terms of quantity to secure core metadata, and also reveals limitations in recommending and using content in other media services. This study supports securing a large number of metadata by utilizing closed caption data pre-archived through the DTV closed captioning server developed in EBS. First, core metadata was automatically extracted by applying Google's natural language AI technology. The next step is to propose a method of finding core metadata by reflecting priorities and content characteristics as core research contents. As a technology to obtain differentiated metadata weights, the importance was classified by applying the TF-IDF calculation method. Successful weight data were obtained as a result of the experiment. The string metadata obtained by this study, when combined with future string similarity measurement studies, becomes the basis for securing sophisticated content recommendation metadata from content services provided to other media.