• Title/Summary/Keyword: traces

Search Result 1,126, Processing Time 0.029 seconds

Importance and Application of Ichnology (생흔학의 중요성 및 활용)

  • Kim, Jong-Kwan;Chun, Seung-Soo;Baek, Young-Sook;Chang, Eun-Kyong;Shin, Sun-Ja
    • The Korean Journal of Petroleum Geology
    • /
    • v.12 no.1
    • /
    • pp.34-42
    • /
    • 2006
  • Ichnology is the study of traces made by various organisms, which includes classification and description of traces, and interpretation of sedimentary process, behavior of organism and depositional environment based on traces and organism behavior. Ichnofacies, which is defined as the association of several traces related together with substrate characteristics and sedimentary processes, is closely related to depositional environment. Ichnology has been applied to sedimentology (to understand physical characteristics of depositional environment, sedimentation pattern and event bed), sequence stratigraphy (to recognize sequence boundaries and biostratigraphic discontinuities such as MFS, TSE and RSE), oil exploration (providing of many information without big cost) and palaeocology. Preliminary ichnological study on the Ganghwa intertidal flat shows that dominant ichofacies are changing with season and location, suggesting that their seasonal variation would be a good indicator to understand the seasonal change of sedimentary processes, the small- scale change of sedimentary environment and the preservation potential of such units. Ichnology on intertidal flat in western coast of Korea has a great potential to apply its results to petroleum geology as well as sedimentology.

  • PDF

An Improved Horizontal Correlation Analysis Using Collision Characteristics on Lookup Table Based Scalar Multiplication Algorithms (참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석)

  • Park, Dongjun;Lee, Sangyub;Cho, Sungmin;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.179-187
    • /
    • 2020
  • The FBC(Fixed-Base Comb) is a method to efficiently operate scalar multiplication, a core operation for signature generations of the ECDSA(Elliptic Curve Digital Signature Algorithm), utilizing precomputed lookup tables. Since the FBC refers to the table depending on the secret information and the values of the table are publicly known, an adversary can perform HCA(Horizontal Correlation Analysis), one of the single trace side channel attacks, to reveal the secret. However, HCA is a statistical analysis that requires a sufficient number of unit operation traces extracted from one scalar multiplication trace for a successful attack. In the case of the scalar multiplication for signature generations of ECDSA, the number of unit operation traces available for HCA is significantly fewer than the case of the RSA exponentiation, possibly resulting in an unsuccessful attack. In this paper, we propose an improved HCA on lookup table based scalar multiplication algorithms such as FBC. The proposed attack improves HCA by increasing the number of unit operation traces by determining such traces for the same intermediate value through collision analysis. The performance of the proposed attack increases as more secure elliptic curve parameters are used.

Habitat Suitability Assessment of the Saemangeum Lake Area for Eurasian Otter(Lutra lutra) and Correlation Analysis with Spatial Variables (새만금호 일대 수달의 서식적합성 평가 및 공간변수와의 상관성 분석)

  • Shin, Hwa-Yong;Shin, Gee-Hoon;Han, Sung-Yong;Rho, Paikho;Lee, Joon-Woo
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.4
    • /
    • pp.298-306
    • /
    • 2020
  • This study was conducted to examine the impact of the correlation between habitat suitability of the Saemangeum lake area for otters and spatial variables (watersides, wetlands, farmlands, urban areas, roads, etc.) on the inhabitation of otters. As a result of the habitat suitability analysis, it was found that 380grids of 1097 grids (34.6%) studied are most suitable and suitable, whereas 413 grids of 1097 grids (37.7%) of the total are marginal and unsuitable. Comparatively analyzing otter traces data against for each spatial variable in the Saemangeum area revealed that the distance to the road or man-made areas is directly proportional to the number of otter traces, while more traces of otters were found areas close to waters. Despite the impact from the internal construction of Saemangeum lake, there found 2 to 6 times more otter traces in the area farthest from the urban areas and roads compared to the area nearest to the urban areas and roads. Thus, when restoring habitats for otters, a minimum of 500(m) distance to roads or urban areas, which can be considered as a threat to the habitats, must be secured.

Soccer Game Analysis I : Extraction of Soccer Players' ground traces using Image Mosaic (축구 경기 분석 I : 영상 모자익을 통한 축구 선수의 운동장 궤적 추출)

  • Kim, Tae-One;Hong, Ki-Sang
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.1
    • /
    • pp.51-59
    • /
    • 1999
  • In this paper we propose the technique for tracking players and a ball and for obtaining players' ground traces using image mosaic in general soccer sequences. Here, general soccer sequences mean the case that there is no extreme zoom-in or zoom-out of TV camera. Obtaining player's ground traces requires that the following three main problems be solved. There main problems: (1) ground field extraction (2) player and ball tracking and team indentification (3) player positioning. The region of ground field is extracted on the basis of color information. Players are tracked by template matching and Kalman filtering. Occlusion reasoning between overlapped players in done by color histogram back-projection. To find the location of a player, a ground model is constructed and transformation between the input images and the field model is computed using four or more feature points. But, when feature points extracted are insufficient, image-based mosaic technique is applied. By this image-to-model transformation, the traces of players on the ground model can be determined. We tested our method on real TV soccer sequence and the experimental results are given.

  • PDF

Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘 확산계층에서 낮은 복잡도를 갖는 부채널 분석)

  • Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.993-1000
    • /
    • 2017
  • When the availability of embedded device is considered, combined countermeasure such as first-order masking and hiding countermeasures is quite attractive because the security and efficiency can be provided at the same time. Especially, combined countermeasure can be applied to the confusion and diffusion layers of the first and last rounds in order to provide the efficiency. Also, the middle rounds only employs first-order masking countermeasure or no countermeasure. In this paper, we suggest a novel side channel analysis with low complexity in the output of diffusion layer. In general, the attack target cannot be set to the output of diffusion layer owing to the high complexity. When the diffusion layer of block cipher is composed of AND operations, we show that the attack complexity can be reduced. Here, we consider that the main algorithm is SEED. Then, the attack complexity with $2^{32}$ can be reduced by $2^{16}$ according to the fact that the correlation between the combination of S-box outputs and that of the outputs of diffusion layer. Moreover, compared to the fact that the main target is the output of S-box in general, we demonstrate that the required number of traces can be reduced by 43~98% in terms of simulated traces. Additionally, we show that only 8,000 traces are enough to retrieve the correct key by suggested scheme, although it fails to reveal the correct key when performing the general approach on 100,000 traces in realistic device.

Development of expressway mode (고속도로 주행 모우드의 개발연구)

  • Park, Sun
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.6 no.1
    • /
    • pp.63-70
    • /
    • 1984
  • The KIER expressway mode was constructed from actual speed-versus-time traces generated by an instrumented test car driven a variety of expressways. This mode reflects the correct proportion of operation on each of the six expressways and preserves the non-steady-state characteristics of real driving. The average speed of the mode is 79.43 km/h and the mode length is 16.22 km.

  • PDF

A study on output feedback control (출력궤환제어에 대한 연구)

  • 심영철
    • 전기의세계
    • /
    • v.30 no.2
    • /
    • pp.86-96
    • /
    • 1981
  • The problem of incomplet state feedback began to appear late in60's and early in 70's. This was motivated by inability to measure all the states of the system in practice. This survey paper traces the early developments in the subject through to the most recent achievement of gain-determining, pole-assignment, stabilization, and low sensitivity system design with output feedback.

  • PDF

LAN Packet Trace Analysis-What is the Extent of WWW Traffic\ulcorner (LAN 패킷 분석을 통한 WWW이 통신상에 끼치는 영향)

  • Lee, Ben;Andreas Schmid;Go, Jin-Gwang;Gwak, Han-Tak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2900-2910
    • /
    • 1999
  • Since its introduction in the early 1990s, the quick growth of the world Wide Web (WWW) traffic raises the question whether past LAN packet traces still reflect the current situation or whether they have become obsolete. For this study, several LAN packet traces were obtained by monitoring the LAN of a typical academic environment. The tools for monitoring the network were a stand-alone HP LAN Protocol Analyzer as well as the free-ware software tool tcpdump. Our main focus was placed on acquiring a low-level overview of the LAN traffic. Thus, we could determine what protocols were mainly used and how the packet sizes were distributed. In particular, we were interested in establishing the amount of WWW traffic on the LAN, and what MIME-Types this traffic is subdivided into. Our results indicate that in a typical academic environment such as ours, conventional sources of LAN traffic such as NFS are still predominant, whereas WWW traffic plays a rather marginal role. Furthermore, we verified that a large portion of the network packets contains little or no data at all, while another significant portion of the packets has sizes around the MTU. Consequently, research in the networking field has to direct its focus on issues beyond the WWW.

  • PDF