• Title/Summary/Keyword: 데이터복구

Search Result 548, Processing Time 0.027 seconds

The Suggestion of Seismic Performance Values on Connections for Performance Based Design of Steel Structures (강구조 성능기반설계를 위한 접합부의 내진성능평가치 제안)

  • Oh, Sang-Hoon;Oh, Young-Suk;Hong, Soon-Jo;Lee, Jin-Woo
    • Journal of Korean Society of Steel Construction
    • /
    • v.23 no.2
    • /
    • pp.147-158
    • /
    • 2011
  • The purpose of this research was to analyze the connections of the seismic-performance values for domestic-performance-based designs. Basic research on the performance design method has been increasing of late, along with performance-based organization investigations. These investigations concern the performance level state of steel structure buildings. According to the performance limit state, seismic-performance values should be presented as appropriate steel structure engineering amounts. The first step, based on the full-scale steel structure experiments, involves researching on the making of a basic document. The moment-rotation angle relationship results of the experiment on the moment-frame connection were used to assort the functional and undamaged limits, which were assumed to be less than the yield moment. Moreover, the repairable and safety limits, which were assumed to exist between the yield and maximum moments, were assorted by investigating the accumulated plastic deformation ratio.

Prediction of Overflow Hazard Area in Urban Watershed by Applying Data-Driven Model (자료지향형 모형을 이용한 도시유역에서의 월류 위험지역 예측)

  • Kim, Hyun Il;Keum, Ho Jun;Lee, Jae Yeong;Kim, Beom Jin;Han, Kun Yeun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.6-6
    • /
    • 2018
  • 최근 집중 호우로 인한 내수침수 피해가 도시화와 기후변화로 늘어나고 있다. 내수침수 피해로 인한 복구비용과 시간이 증가하고 있으며 향후에는 이보다 더 크게 늘어날 것으로 예상된다. 이러한 문제를 해결하기 위하여 충분한 선행시간을 가지고 내수 침수 구역을 제시할 수 있어야 한다. 기존의 물리적 모델은 정확하고 정교한 결과를 제공하지만, 시뮬레이션을 준비하고 마치는 데에 시간이 많이 소요된다. 그 이유로서는 강우량, 지형적 특성, 배수관망 시스템, 수문학적 매개변수 등의 다양한 데이터도 필요하기 때문이다. 이는 도시유역에 대한 내수침수의 실시간 예측이 어렵게 되었으며, 충분한 선행시간을 확보하지 못하는 원인이 되었다. 본 연구에서는 이 문제에 대한 해결책으로 결정론적 방법과 확률론적 방법을 자료지향형 모형으로 결합하여 해결책을 제시하고자 하며, 특정 강우 조건하에 도시유역에서의 내수침수에 영향을 미치는 맨홀에 대한 정보를 제공하고자 한다. 위와 같은 과정을 수행하기 위하여 입력자료 조합에 대한 비선형 분석을 실시하였으며, 그 결과로 특정 강우 조건에 대하여 각 맨홀에 대한 누적월류량을 예측할 수 있는 비선형 인공신경망을 구축할 수 있었다. 본 연구에서 제시된 방법론은 국내의 강남 배수분구에 대하여 적용이 되었으며, 내수침수 예측결과와 2차원 해석결과를 비교하고자 하였다. 본 연구에서는 위 과정을 통하여 1차원 도시유출해석을 위한 입력 자료를 준비하는 시간을 절약하고, 다양한 강우 조건과 내수침수지도 사이의 연관성을 학습하는 예측 모형을 이용하여 도시유역의 내수침수에 대한 충분한 선행시간을 확보하고자 한다. 결론적으로, 이 연구의 결과는 도시유역에 대한 비구조적 대책 수립에 도움을 줄 것으로 확인이 되며 도시 유역 내에 맨홀 위치들을 고려한 위험지구를 파악하는 데에 유용할 것으로 판단된다.

  • PDF

A Study of the HLA Compliance Testing System and Procedures for ROK (한국형 HLA(High Level Architecture) 적합성 인증시험 체계 및 절차 연구)

  • Jo, Hee-Jin;Lee, Chong-Ho;Kim, Jae-Man
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.15-24
    • /
    • 2018
  • High Level Architecture(HLA) for modeling and simulation is an international technical standard to achieve simulation interoperability and reusability. Building federation through the interworking of federates is being used in various fields and is being used in KR(Key Resolve), UFG(Ulchi-Freedom Guardian) as a representative in domestic military. Currently, United States Department of Defense emphasizes the HLA compliance test, which confirms the compliance of Federate by using HLA. However, due to the limitations of testing tools, an HLA compliance test of DoD is not able to perform some of the functional tests on HLA/RTI services such as federation storage/recovery services and also exclude inspection of exchange data between federates. To solve these problems, this paper proposes an HLA compliance testing system of ROK suitable for domestic situations. This will enable effective HLA compliance testing and improve interoperability between federates.

Truncated Differential Cryptanalysis on PP-1/64-128 (블록 암호 PP-1/64-128에 대한 부정 차분 공격)

  • Hong, Yong-Pyo;Lee, Yus-Sop;Jeong, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.35-44
    • /
    • 2011
  • The PP-1/64-128 block cipher support variety data block and secret key size. Also, it is suitable for hardware implementation and can much easier to apply Concurrent Error Detection(CED) for cryptographic chips compared to other block ciphers, because it has same encryption and decryption process. In this paper, we proposed truncated differential cryptanalysis of PP-1/64-128. the attack on PP-1/64-128 block cipher requires $2^{50.16}$ chosen plaintexts, $2^{46.16}$ bytes memory spaces and $2^{50.45}$ PP-1/64-128 encryption to retrieve secret key. This is the best result of currently known PP-1/64-128 differential cryptanalysis.

SITM Attacks on GIFT-128: Application to NIST Lightweight Cryptography Finalist GIFT-COFB (GIFT-128에 대한 SITM 공격: NIST 경량암호 최종 후보 GIFT-COFB 적용 방안 연구)

  • Park, Jonghyun;Kim, Hangi;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.607-615
    • /
    • 2022
  • The SITM (See-In-The-Middle) proposed in CHES 2020 is a methodology for side-channel assisted differential cryptanalysis. This technique analyzes the power traces of unmasked middle rounds in partial masked SPN block cipher implementation, and performs differential analysis with the side channel information. Blockcipher GIFT is a lightweight blockcipher proposed in CHES 2017, designed to correct the well-known weaknesses of block cipher PRESENT and provide the efficient implementation. In this paper, we propose SITM attacks on partial masked implementation of GIFT-128. This attack targets 4-round and 6-round masked implementation of GIFT-128 and time/data complexity is 214.01 /214.01, 216 /216. In this paper, we compare the masterkey recovery logic available in SITM attacks, establishing a criterion for selecting more efficient logic depending on the situation. Finally, We introduce how to apply the this attack to GIFT-COFB, one of the finalist candidates in NIST lightweight cryptography standardization process.

SITM Attacks on Skinny-128-384 and Romulus-N (Skinny-128-384와 Romulus-N의 SITM 공격)

  • Park, Jonghyun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.807-816
    • /
    • 2022
  • See-In-The-Middle (SITM) is an analysis technique that uses Side-Channel information for differential cryptanalysis. This attack collects unmasked middle-round power traces when implementing block ciphers to select plaintext pairs that satisfy the attacker's differential pattern and utilize them for differential cryptanalysis to recover the key. Romulus, one of the final candidates for the NIST Lightweight Cryptography standardization competition, is based on Tweakable block cipher Skinny-128-384+. In this paper, the SITM attack is applied to Skinny-128-384 implemented with 14-round partial masking. This attack not only increased depth by one round, but also significantly reduced the time/data complexity to 214.93/214.93. Depth refers to the round position of the block cipher that collects the power trace, and it is possible to measure the appropriate number of masking rounds required when applying the masking technique to counter this attack. Furthermore, we extend the attack to Romulus's Nonce-based AE mode Romulus-N, and Tweakey's structural features show that it can attack with less complexity than Skinny-128-384.

Blurred Image Enhancement Techniques Using Stack-Attention (Stack-Attention을 이용한 흐릿한 영상 강화 기법)

  • Park Chae Rim;Lee Kwang Ill;Cho Seok Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.83-90
    • /
    • 2023
  • Blurred image is an important factor in lowering image recognition rates in Computer vision. This mainly occurs when the camera is unstablely out of focus or the object in the scene moves quickly during the exposure time. Blurred images greatly degrade visual quality, weakening visibility, and this phenomenon occurs frequently despite the continuous development digital camera technology. In this paper, it replace the modified building module based on the Deep multi-patch neural network designed with convolution neural networks to capture details of input images and Attention techniques to focus on objects in blurred images in many ways and strengthen the image. It measures and assigns each weight at different scales to differentiate the blurring of change and restores from rough to fine levels of the image to adjust both global and local region sequentially. Through this method, it show excellent results that recover degraded image quality, extract efficient object detection and features, and complement color constancy.

A Study on analysis tools in the SWF file URL (SWF 파일의 URL정보 분석도구)

  • Jang, Dong-Hwan;Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.105-111
    • /
    • 2010
  • SWF(Shock Wave Flash) file is a format file for vector graphics produced by Adobe. It is widely used for a variety of contents such as advertising at websites, widgets, games, education, and videos and it contains various types of data such as sound sources, script, API and images. Many SWF files contain URL information on action script for communication in the network and they can be used as important research data as well as PC users' Web Browser history in terms of forensic investigation. And a decompiler for analyzing SWF files exists by which SWF files can be analysed and URL information can be verified. However, it takes a long time to verify the URL information on action scripts of multiple SWF files by the decompiler. In this paper, analysis of URL information on action scripts and extraction of URL information from multiple SWF files by designing analysis tools for URL information in SWF files is studied.

A Study on the Production of 3D Datasets for Stone Pagodas by Period in Korea

  • Byong-Kwon Lee;Eun-Ji Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.105-111
    • /
    • 2023
  • Currently, most of content restoration using artificial intelligence learning is 2D learning. However, 3D form of artificial intelligence learning is in an incomplete state due to the disadvantage of requiring a lot of computation and learning speed from the existing 2 axes (X, Y) to 3 axes (X, Y, Z). The purpose of this paper is to secure a data-set for artificial intelligence learning by analyzing and 3D modeling the stone pagodas of ourinari by era based on the two-dimensional information (image) of cultural assets. In addition, we analyzed the differences and characteristics of towers in each era in Korea, and proposed a feature modeling method suitable for artificial intelligence learning. Restoration of cultural properties relies on a variety of materials, expert techniques and historical archives. By recording and managing the information necessary for the restoration of cultural properties through this study, it is expected that it will be used as an important documentary heritage for restoring and maintaining Korean traditional pagodas in the future.

A Study on the Design and Implementation of Multi-Disaster Drone System using Deep Learning-based Object Recognition and Optimal Path Planning (딥러닝 기반 객체 인식과 최적 경로 탐색을 통한 멀티 재난 드론 시스템 설계 및 구현에 대한 연구)

  • Kim, Jin-Hyeok;Lee, Tae-Hui;Park, Jonghyen;Jeong, Yerim;Jang, Seohyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.556-559
    • /
    • 2020
  • 최근 태풍, 지진, 산불, 산사태, 전쟁 등 다양한 재난 상황으로 인한 인명피해와 자금 손실이 꾸준히 발생하고 있고 현재 이를 예방하고 복구하기 위해 많은 인력과 자금이 소요되고 있는 실정이다. 이러한 여러 재난 상황을 미리 감시하고 재난 발생의 빠른 인지 및 대처를 위해 본 논문에서는 인공지능 기반의 재난 드론 시스템을 설계 및 개발하였다. 본 연구에서는 사람이 감시하기 힘든 지역에 여러 대의 재난 드론을 이용하며 딥러닝 기반의 최단 경로 알고리즘을 적용해 각각의 드론이 최적의 경로로 효율적 탐색을 실시한다. 또한 드론의 근본적 문제인 배터리 용량 부족에 대한 문제점을 해결하기 위해 Ant Colony Optimization (ACO) 기술을 이용하여 각 드론의 최적 경로를 결정하게 된다. 제안한 시스템 구현을 위해 여러 재난 상황 중 산불 상황에 적용하였으며 전송된 데이터를 기반으로 산불지도를 만들고, 빔프로젝터를 탑재한 드론이 출동한 소방관에게 산불지도를 시각적으로 보여주었다. 제안한 시스템에서는 여러 대의 드론이 최적 경로 탐색 및 객체인식을 동시에 수행함으로써 빠른 시간 내에 재난 상황을 인지할 수 있다. 본 연구를 바탕으로 재난 드론 인프라를 구축하고 조난자 탐색(바다, 산, 밀림), 드론을 이용한 자체적인 화재진압, 방범 드론 등에 활용할 수 있다.