• Title/Summary/Keyword: 단위 취약점

Search Result 67, Processing Time 0.027 seconds

Extended Edge Based Line Averaging Method for Deinterlacing (확장된 에지기반 라인평균 방법의 디인터레이싱 응용)

  • Min Byong seok;Kim Seung jong;Cho Dong uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.223-229
    • /
    • 2005
  • In this paper, we proposed an extended edge-based line averaging method for deinterlacing with restricted search range. Conversion from interlaced signal to non-interlaced signal is one of important issues. Conventional deinterlacing algorithms usually utilize edge-based line average algorithm(ELA) within pixel-by-pixel approach. However, it is very sensitive to noise and variation of intensity. To reduce the sensitivity, the proposed method adopts a block-by-block approach and provides reliable direction of edge. Simulation results show that it provides a better performance than other pixel-by-pixel ELA-based methods.

Study on Improving Vulhearability in IPv4/IPv6 Header Translation Mechanism (IPv4/IPv6 헤더변환 방식에서의 취약성 개선에 관한 연구)

  • 황호준;유승재;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.73-84
    • /
    • 2003
  • The IPv4 that used to be generally used as a medium of computer communications in 1980s has reached its limits now. IPv6 (IP Version 6) is being prepared to solve the limitations of the IPv4. However, the biggest problem of IPv6 is that it is not compatible with the IPv4. To resolve the compatibility issue, Dual Stack, Tunneling and Header Converting methods have been proposed. The Header Converting method allows communications between the IPv4 and IPv6 networks with the converter. This method's strength is that it is easy to embody and the procedures for embodiment is simple. However, this method still contains the weaknesses that the existing IPv4 has. On the current document, the Header Converting method among the three methods is discussed to resolve the problems this method has. To solve the Header Converting method's weakness, the security problem between sections, the IP Header field values are converted to the relative field values and IPSec (IP Security) and ESP (Encapsulation Security Payload) are applied. The proposed "Encrypted Header Converting Method" that is encrypted in packet units has solved the weakness that the pre-existing Header Converting method used to have.d to have.

  • PDF

Assessment of Local Social Vulnerability in Facing Merapi Volcanic Hazard (메라피 화산재해에 대한 지역단위의 사회적 취약성 평가)

  • Lee, Sungsu;Maharani, Yohana Noradika;Yi, Waon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.485-492
    • /
    • 2014
  • In regards to natural disasters, vulnerability analysis is a component of the disaster risk analysis with one of its objectives as a basis for planning priority setting activities. The volcano eruption raises many casualties and property in the surrounding area, especially when the volcano located in densely populated areas. Volcanic eruptions cannot be prevented, but the risk and vulnerability can be reduced which involve careful planning and preparations that anticipate a future crisis. The social vulnerability as social inequalities with those social factors can influence the susceptibility of various groups to harm and govern their ability to respond. This study carried out the methods of Social Vulnerability Index (SoVI) to measure the socially created vulnerability of the people living in Merapi proximal hamlets in Central Java, Indonesia that refers to the socioeconomic and demographic factors that affect the resilience of communities in order to describe and understand the social burdens of risk. Social vulnerability captured here, using a qualitative survey based-data such as interviews to local people with random ages and background to capture the answer vary, also interviews to stakeholders to help define social vulnerability variables. The paper concludes that by constructing the vulnerability index for the hamlets, the study reveals information about the distribution and causes of social vulnerability. The analysis using SoVI confirms that this method works well in ensuring that positive values indicating high social vulnerability and vice versa.

A study on the Methodology of Extracting the Poor Deprived Districts by Using Geospatial Information (국토정보를 활용한 빈곤·취약지구 추출 방법에 관한 연구)

  • Lee, Hee-Yeon;An, Eun-Kyung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.5-25
    • /
    • 2016
  • The purpose of this study develops the methodology to extract the poor deprived districts using the data from the national spatial data infrastructure portal. Particularly this study tries to select more acute indicators and to test the operability of such indicators. Also this study is focused on the versatile methodology that can be adjusted to incorporate alternative indicators that might be appropriate according to the hierarchy of the spatial unit. The indicator sets are composed of three dimensions: the poor class, the poor old housing, and poor residential neighborhood environment. Each representative indicator is selected based on the characteristics of the poor deprived districts. As a result, at the level of administrative Dong, key indicators for extracting the poor deprived districts are number of recipients of national basic living security per thousand persons and ratio of households living at old detached house. At the level of the national based zip code district, the ratio of buildings built on parcels located at roads below 4m in width, the ratio of small parcels below $60m^2$ and the ratio of poor old buildings are very important indicators. The result of grid analysis by overlaying the coverage of multiple indicators shows that relatively more vulnerable and deprived districts can be extracted at the small sub-district level. This study suggests the possibility to create the high value-added information, using the data from the national spatial data infrastructure portal. This methodology enables policymakers to select the priority target districts of poor deprived district more effectively.

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

Development of X-Band weather radar quality control technology for non-weather echo removal (비기상에코 제거를 위한 X-밴드 기상레이더 품질관리 기술 개발)

  • Jin-woo Park;Sun-Jin Mo;Ji-Young Gu;Seungwoo Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.114-114
    • /
    • 2023
  • 기상레이더는 대류권의 기상 관측에 널리 사용되며, 기상예보를 비롯하여 항공, 농업, 수문학 등 다양한 분야에서 활용하고 있다. 기상레이더센터는 SSPA(Solid State Power Amplifier) 기반 X-Band 주파수대역(9GHz)을 사용하는 연구용 소형기상레이더 관측망을 운영하고 있다. 주로 수도권 저층 대기에서 발생하는 위험 기상현상을 1분 단위로 빠르게 관측하면서 정확한 강수 정보생산을 위한 연구를 수행하고 있다. 레이더 관측 자료는 전파를 이용하여 넓은 범위에 분포하는 눈, 비, 우박 등 대기수상체를 관측하여, 강수량 추정을 통해 강수 정보를 생산한다. 이에 따라 레이더 관측 자료의 정확성과 신뢰도를 높이기 위해서 레이더 품질관리 기술 적용은 필수적이다. 기상레이더센터는 소형기상레이더로 관측한 이중편파 자료의 효과적인 품질관리를 위한 각종 자료처리 모듈을 개발하여, 실시간 자료처리 프로그램에 적용하였다. 우선, 저층 대기 관측 시 기상에코와 더불어 강한 반사도로 나타나는 지형에코를 판별하는 모듈과 선형 또는 쐐기형태의 전파간섭에코를 비롯한 비기상에코를 효과적으로 제거하는 기술을 개발하였다. 다음으로, X-Band 주파수대역 기상레이더 관측 자료의 취약점인 강한 강수 시 발생하는 반사도 감쇠 현상을 보정하기 위한 기술도 개발하였다. 소형기상레이더 품질관리 개발과 적용을 통하여 생산된 자료는 HSR(Hybrid Surface Rainfall), 레이더 강수량 추정, 대기수상체 등 다양한 기상 산출물 생산과 동시에 기상 감시 및 연구 분야에 효과적으로 활용하고 있다.

  • PDF

Detecting Spectre Malware Binary through Function Level N-gram Comparison (함수 단위 N-gram 비교를 통한 Spectre 공격 바이너리 식별 방법)

  • Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1043-1052
    • /
    • 2020
  • Signature-based malicious code detection methods share a common limitation; it is very hard to detect modified malicious codes or new malware utilizing zero-day vulnerabilities. To overcome this limitation, many studies are actively carried out to classify malicious codes using N-gram. Although they can detect malicious codes with high accuracy, it is difficult to identify malicious codes that uses very short codes such as Spectre. We propose a function level N-gram comparison algorithm to effectively identify the Spectre binary. To test the validity of this algorithm, we built N-gram data sets from 165 normal binaries and 25 malignant binaries. When we used Random Forest models, the model performance experiments identified Spectre malicious functions with 99.99% accuracy and its f1-score was 92%.

A Study on Methodology of Irrigation Return Flow Estimation to Improve Instream Flow (하천유지유량 개선을 위한 관개회귀수량 산정방법론 연구)

  • Deokhwan Kim;Hyeonjun Kim;Cheol Hee Jang;Jeonghyeon Choi;Hyoungsub Shin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.301-301
    • /
    • 2023
  • 국가 수자원 중 농업용수 사용비율은 약 41%에 해당하며, 통합물관리측면에서 큰 비중을 차지하고 있다. 국가 수자원 전체 이용량 372억m3 중에서 농업용수가 40.9%인 152억m3로 가장 많고, 환경용수 121억m3(32.5%), 생활용수 76억m3(20.4%), 공업용수 23억m3(6.2%)등으로 추산된다. 국가 수자원관리의 중요성이 커짐에 따라 수량 및 수질관리를 환경부로 일원화하여 관리하며, 농업용수의 유역단위 물관리의 필요성이 요구되고 있다. 농업용수는 대부분 벼농사에 소비되고 있으며, 관개용수는 증발산량, 침투량, 자연 및 인위적인 배수량으로 소비된다. 회귀수량은 관개를 통해 농경지에 공급된 용수 중 작물에 의해 소모되지 않고 하천으로 유입되는 수량을 의미하며, 신속회귀수량(quick return flow)과 지연회귀수량(delayed return flow)으로 구분할 수 있다. 수자원장기종합계획에서는 35%가 하천으로 회귀되는 것으로 가정하고 있지만, 선행연구 결과에 의하면 국내 농업용수 회귀율은 기상상태, 작물재배품종, 재배형태, 용배수로 구조 등 여러 가지 요인으로 인하여 약 32 ~ 86%의 다양한 범위로 큰 차이가 나타난다. 이에 본 연구에서는 기존의 회귀수량 산정방법의 취약점을 보완하여, 수문모델링을 통한 유역단위 차원의 회귀수량 산정방안을 제시함으로써, 하천유지유량 관리 개선방안을 모색하고자 한다.

  • PDF

All Optical Header Recognition for Information Processing of Packet by Packet in The Access Network based on FTTH (FTTH 기반의 가입자망에 있어 패킷단위의 정보처리를 위한 전광학 헤더 인식)

  • Park, Ki-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.69-76
    • /
    • 2010
  • We describe an all-optical circuit which recognizes the header information of packet-by-packet in the access networks based on FTTH. The circuit's operation is confirmed by an experiment in the recognition of 3 and 4 header bits. The output from the header recognition circuit appears in a signal assigned in the time axis according to the header information. The recognition circuit of header for self-routing has a very simple structure using only delay lines and switches. The circuit is expected that it can be constructed of the high reliability and the low cost. Also, the circuit can solve the problems of the power loss and private security which is the weak point of the TDM-PON method by being established a unique transmission line to each subscriber.

Effect of the spandrel end beams on shear strength behavior in MTS systems (MTS (Multi-tee slab) 시스템의 테두리보가 전단 강도에 미치는 영향)

  • Kim, Min-Ki;Hong, Sung-Gul;Lee, Jong-Min;Cho, Yi-Hoon
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.11a
    • /
    • pp.189-192
    • /
    • 2008
  • Most existing double tee systems have need to improve flexure and shear design at their flanges in the section. In order to solve this problem we have devised MTS(Multi-tee slab) system, which is composed of several T-beams and applied spandrel end beams at each slab unit. The application of spandrel end beams has an beneficial effect on the shear strength and force distribution of slab unit because they support the ribs in the transverse direction. Numerical analysis shows that the spandrel end beams increase the shear strength. This paper represents the analysis of shear strength in MTS system and the effect of the spandrel end beams on the system.

  • PDF