• Title/Summary/Keyword: 변조 인식

Search Result 147, Processing Time 0.034 seconds

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

Fast Preprocessing Technique based on High-Pass Filtering for Spool Rate Extraction of Weak JEM Signals (약한 제트 엔진 변조 신호의 Spool Rate 추출을 위한 High-Pass Filtering 기반의 빠른 전처리 기법)

  • Song, Won-Young;Kim, Hyung-Ju;Kim, Sung-Tai;Shin, In-Seon;Myung, Noh-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.5
    • /
    • pp.380-388
    • /
    • 2019
  • Jet engine modulation(JEM) signals are widely used for target recognition. These signals coming from a potentially hostile aircraft provide specific information about the jet engine. In order to obtain the number of blades, which is uniquely provided by the JEM signal, one must extract the spool rate, which is the rotation speed of the blades. In this paper, we propose an algorithm to extract the spool rate from a weak JEM signal. A criterion is developed to extract the spool rate from the JEM signal by analyzing the intensity of the JEM signal component. The weak signal is first subjected to a high-pass filtering-based process, which modifies it to facilitate spool rate extraction. We then apply a peak detection process and extract the spool rate. The technique is simpler than the existing CEMD or WD method, is accurate, and greatly reduces the time required.

A Study on Implementation of Humane Resource Pool Recruitment system Using Blockchain

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.69-78
    • /
    • 2021
  • In this paper, we propose a implementation plan of the human resource pool recruitment system using private (permitted) blockchain. The term Human Resource has become commonly used and has come to recognize human resources as resources. Despite these changes, the use of human resource pools has been sluggish. Once entered, information is often not updated on a regular basis and does not provide sharing, searching, carrier management and anti-counterfeiting. In this research, in order to provide a human resource pool recruitment system that utilizes private (permitted) blockchain, we first used the blockchain network to enable sharing and searching of human resource pools, and to use keywords. Used to get results that meet certain conditions. Second, we added an institutional verification process to ensure the integrity of the input data and prepared preventive measures in the non-technical part by utilizing the structural characteristics of the blockchain to prevent counterfeiting and alteration. Third, we designed and implemented a Dapp (Decentralized application) that includes a Web UI so that each of the three groups can control the blockchain and the predefined processes and business logic.

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Design and Implementation of VLID System by Back-Scattering Visible Light (가시광의 후방산란을 이용한 VLID 시스템 설계 및 구현)

  • Yun, Jisu;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.1
    • /
    • pp.10-18
    • /
    • 2017
  • In this paper, we designed and implemented a visible light identification(VLID) system consisting of a VLID reader and a tag which backscatters incident lights from the reader. A VLID tag sends its ID to the reader by switching an LCD shutter which is located on its surface. The VLID reader consists of six LEDs and a photodiode(PD). The LEDs emit visible light and a PD located in a center position of LEDs receives backscattered light from the VLID tag. A microcontroller and a commercial liquid crystal display(LCD) shutter for 3D-TV glasses are used to implement a VLID tag. Experiments were conducted to confirm VLID system performance. We successfully demonstrated experiments to send NRZ-OOK signal of 100 bps over a distance of 35 cm at daytime. Also, we suggested the theoretical maximum transmission rate and the various methods to enhance the separation distance between a VLID reader and a tag.

A study on monitoring the inner structure of dam body using high resolution seismic reflection method (고분해능 탄성파 반사법을 이용한 댐체 내부구조 모니터링 연구)

  • Kim Jungyul;Kim Hyoungsoo;Oh Seokhoon;Kim Yoosung
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.15-20
    • /
    • 2005
  • Defects of dam body which can be induced in seepage or leakage procedure can directly affect dam safety. Therefore, a proper inspection method should be carried out in the first place to find out their positions and sizes, After that, some reinforcement works such as grouting and the corresponding assessment could be taken in a proper way. The dam(center core type earth dam) issued in this study has been in need for intensive diagnosis and reinforcement work, because a lot of slumps similar to cracks, seepage and some boggy area have been observed on the downstream slope. High resolution seismic reflection method was performed on the crest profile twice before and after grouting work(Aug. 2001 and Nov. 2004) aimed at the dam inspection and the assessment of grouting efficiency as well. To enhance the data resolution, P-beam energy radiation technique which can reduce the surface waves and hence to reinforce the reflection events was used. Strong reflection events were recognized in the stack section before grouting work, It seems that the events would be caused by e.g. horizontal cracks with a considerable aperture, Meanwhile such strong reflection events were not observed in the section after grouting. That is, the grouting work was dear able to reinforce the defects of dam body. Hence, the section showed an well arranged picture of dam inner structure. In this sense, seismic reflection method will be a desirable technique for dam inspection and for monitoring dam inner structure as well.

  • PDF

A study on Monitoring the Inner Structure of Dam Body Using High Resolution Seismic Reflection Method (고분해능 탄성파 반사법을 이용한 댐체 내부구조 모니터링 연구)

  • Kim, Jung-Yul;Kim, Hyoung-Soo;Oh, Seok-Hoon;Kim, Yoo-Sung
    • Journal of the Korean Geophysical Society
    • /
    • v.8 no.1
    • /
    • pp.1-6
    • /
    • 2005
  • Defects of dam body which can be induced in seepage or leakage procedure can directly affect dam safety. Therefore, a proper inspection method should be carried out in the first place to find out their positions and sizes. After that, some reinforcement works such as grouting and the corresponding assessment could be taken in a proper way. The dam(center core type earth dam) issued in this study has been in need for intensive diagnosis and reinforcement work, because a lot of slumps similar to cracks, seepage and some boggy area have been observed on the downstream slope. High resolution seismic reflection method was performed on the crest profile twice before and after grouting work(Aug. 2001 and Nov. 2004) aimed at the dam inspection and the assessment of grouting efficiency as well. To enhance the data resolution, P-beam energy radiation technique which can reduce the surface waves and hence to reinforce the reflection events was used. Strong reflection events were recognized in the stack section before grouting work, It seems that the events would be caused by e.g. horizontal cracks with a considerable aperture. Meanwhile such strong reflection events were not observed in the section after grouting. That is, the grouting work was dear able to reinforce the defects of dam body. Hence, the section showed an well arranged picture of dam inner structure. In this sense, seismic reflection method will be a desirable technique for dam inspection and for monitoring dam inner structure as well.

  • PDF

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

Simulation of Ladar Range Images based on Linear FM Signal Analysis (Linear FM 신호분석을 통한 Ladar Range 영상의 시뮬레이션)

  • Min, Seong-Hong;Kim, Seong-Joon;Lee, Im-Pyeong
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.2
    • /
    • pp.87-95
    • /
    • 2008
  • Ladar (Laser Detection And Ranging, Lidar) is a sensor to acquire precise distances to the surfaces of target region using laser signals, which can be suitably applied to ATD (Automatic Target Detection) for guided missiles or aerial vehicles recently. It provides a range image in which each measured distance is expressed as the brightness of the corresponding pixel. Since the precise 3D models can be generated from the Ladar range image, more robust identification and recognition of the targets can be possible. If we simulate the data of Ladar sensor, we can efficiently use this simulator to design and develop Ladar sensors and systems and to develop the data processing algorithm. The purposes of this study are thus to simulate the signals of a Ladar sensor based on linear frequency modulation and to create range images from the simulated Ladar signals. We first simulated the laser signals of a Ladar using FM chirp modulator and then computed the distances from the sensor to a target using the FFT process of the simulated signals. Finally, we created the range image using the distances set.

  • PDF

A 3~5 GHz Interferer Robust IR-UWB RF Transceiver for Data Communication and RTLS Applications (간섭 신호에 강인한 특성을 갖는 데이터 통신과 위치 인식 시스템을 위한 3~5 GHz 대역의 IR-UWB RF 송수신기)

  • Ha, Jong Ok;Park, Myung Chul;Jung, Seung Hwan;Eo, Yun Seong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.1
    • /
    • pp.70-75
    • /
    • 2014
  • This paper presents a IR-UWB(Impulse Radio Ultra-Wide Band) transceiver circuit for data communication and real time location system. The UWB receiver is designed to OOK(On-Off Keying) modulation for energy detection. The UWB pulse generator is designed by digital logic. And the Gaussian filter is adopted to reject side lobe in transmitter. The measured sensitivity of the receiver is -65 dBm at 4 GHz with 1 Mbps PRF(Pulse Repetition Frequency). And the measured energy efficiency per pulse is 20.6 pJ/bit. The current consumption of the receiver and transmitter including DA is 27.5 mA and 25.5 mA, respectively, at 1.8 V supply.