• Title/Summary/Keyword: 전송 복구

Search Result 366, Processing Time 0.023 seconds

Reliability improvement methods of AF track circuits for the train control system (열차내 연산시스템용 AF궤도회로 신뢰성향상 방안 연구)

  • Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4762-4767
    • /
    • 2012
  • The AF track circuit that detecting train position and transmitting various train control data for DTG to the train on-board is composed of single operation system. If a failure occurs on this system, the driver should be operate the train by manually until the system is restored, because the system cannot control switch machines and signals by automatically. In this process the human error affects to the train delay, collision, derailment and critical safety accident. Therefore, this document has analyzed the effects that each failure mode influences on system and train, and quantified the failure valuation point and class. Basis on this quantified analysis result, MTBF increased and MTTR decreased and failure number also decreased by adopting the independent installation of power supply, the replacement of defected capacitors, the installation of resister cooling system and the improvement of maintenance methods. And the failure factors of AF track circuits were decreased by conducting the preventive maintenance which is a quantitative way of maintenance system by experience.

Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks (비동기 공격에 안전한 패스워드기반 상호 인증 프로토콜)

  • Yuk, Hyeong-Jun;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.24-32
    • /
    • 2013
  • Authentication is one of the necessary elements in the network environment. Many researches have detected security vulnerabilities to the existing authentication mechanisms and suggested secure mutual authentication protocols by resolving these vulnerabilities. The representative ones of them are SPMA(Strong Pass Mutual Authentication) and I-SPMA(Improved Strong Password Mutual Authentication). However, these protocols cause a critical problem when the shared secret information is de-synchronized between the server and the client. This paper proposes a revised protocol to resolve the de-synchronization problem. Based on a security assessment on the proposed protocol, we consider the proposed protocol is safer than the previous ones and possible to effectively make a user authentication system mre secure.

Power Analysis Attack of Block Cipher AES Based on Convolutional Neural Network (블록 암호 AES에 대한 CNN 기반의 전력 분석 공격)

  • Kwon, Hong-Pil;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.14-21
    • /
    • 2020
  • In order to provide confidential services between two communicating parties, block data encryption using a symmetric secret key is applied. A power analysis attack on a cryptosystem is a side channel-analysis method that can extract a secret key by measuring the power consumption traces of the crypto device. In this paper, we propose an attack model that can recover the secret key using a power analysis attack based on a deep learning convolutional neural network (CNN) algorithm. Considering that the CNN algorithm is suitable for image analysis, we particularly adopt the recurrence plot (RP) signal processing method, which transforms the one-dimensional power trace into two-dimensional data. As a result of executing the proposed CNN attack model on an XMEGA128 experimental board that implemented the AES-128 encryption algorithm, we recovered the secret key with 22.23% accuracy using raw power consumption traces, and obtained 97.93% accuracy using power traces on which we applied the RP processing method.

An Enhanced Greedy Message Forwarding Protocol for Increasing Reliability of Mobile Inter-Vehicle Communication (이동하는 차량 간 통신의 신뢰성 향상을 위한 개선된 탐욕 메시지 포워딩 프로토콜)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Vehicle-to-Vehicle (V2V) is a special type of vehicle ad-hoc network (VANET), and known as a solution to provide communication among vehicles and reduce vehicle accidents. Geographical routing protocols as Greedy Perimeter Sateless Routing (GPSR) are very suitable for the V2V communication due to special characters of highway and device for vehicles. However, the GPSR has problem that appears local maximum by some stale neighbor nodes in the greedy mode of the GPSR. It can lose transmission data in recovery mode, even if the problem is can be solved by the recovery mode of the GPSR. We therefore propose a Greedy Perimeter Reliable Routing (GPRR), can provide more reliable data transmission, to resolve the GPSR problem in the V2V environment. Simulation results using ns-2 shown that the GPRR reveals much better performance than the GPSR by remarkably reducing the local maximum rate in the greedy mode.

Hybrid Error Concealment Algorithm for Intra-Frame in H.264 (H.264의 인트라 프레임을 위한 하이브리드 에러 은닉 알고리즘)

  • Yim Chang-Hoon;Kim Won-Jung;Lim Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8C
    • /
    • pp.777-785
    • /
    • 2006
  • H.264 is the prominent video coding standard in various applications such as real-time video streaming and digital multimedia broadcasting, since it provides enhanced compression performance, error resilience tools, and network adaptation. Since compressed video stream is vulnerable to packet loss, error resilience and error concealment(EC) tools are essential for the transmission of video over the Internet. In this paper, we first propose a simple temporal EC method that improves the EC performance for intra-frame in H.264 when the amount of motion is relatively small. Then we propose a new hybrid EC method for intra-frame in H.264, which combines the spatial EC and temporal EC adaptively. The simulations are performed in packet-lossy environments, and the proposed hybrid EC method shows about 0.5-4dB PSNR improvement compared to the conventional spatial EC method that is used for intra-frame in H.264.

Improvement to High-Availability Seamless Redundancy (HSR) Unicast Traffic Performance Using a Hybrid Approach, QRPL (High-Availability Seamless Redundancy (HSR)의 Unicast 트래픽 성능 향상을 위한 QRPL 알고리즘)

  • Altaha, Ibraheem Raed;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.29-35
    • /
    • 2016
  • High-availability seamless redundancy (HSR) is a fault-tolerant protocol for Ethernet networks that provides two frame copies for each frame sent. Each copy is forwarded on a separate physical path. HSR is a potential candidate for several fault-tolerant Ethernet applications, including smart-grid communications. However, the major drawback of the HSR protocol is that it generates and circulates unnecessary frames within connected rings regardless of the presence of a destination node in the ring. This downside degrades network performance and can deplete network resources. Two simple but efficient approaches have previously been proposed to solve the above problem: quick removing (QR) and port locking (PL). In this paper, we will present a hybrid approach, QRPL, by combining QR with PL, resulting in further traffic reductions. Our analysis showed that network traffic is significantly reduced for a large-sized HSR connected ring network compared to the standard HSR protocol, QR, and PL.

Synchronized One-to-many Media Streaming employing Server-Client Coordinated Adaptive Playout Control (적응형 재생제어를 이용한 동기화된 일대다 미디어 스트리밍)

  • Jo, Jin-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.493-505
    • /
    • 2003
  • A new inter-client synchronization framework for multicast media streaming is proposed employing a server-client coordinated adaptive playout control. The proposed adaptive player controls the playback speed of audio and video by adopting the time-scale modification of audio. Based on the overall synchronization status as well as the buffer occupancy level, the playout speed of each client is manipulated within a perceptually tolerable range. Additionally, the server implicitly helps increasing the time available for retransmission while the clients perform an interactive error recovery mechanism with the assistance of playout control. The network-simulator based simulations show that the proposed framework can reduce the playout discontinuity without degrading the media quality, and thus mitigate the client heterogeneity.

Kalman filter based Motion Vector Recovery for H.264 (H.264 비디오 표준에서의 칼만 필터 기반의 움직임벡터 복원)

  • Ko, Ki-Hong;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.801-808
    • /
    • 2007
  • Video coding standards such as MPEG-2, MPEG-4, H.263, and H.264 transmit a compressed video data using wired/wireless communication line with limited bandwidth. Because highly compressed bit-streams is likely to fragile to error from channel noise, video is damaged by error. There have been many research works on error concealment techniques, which recover transmission errors at decoder side [1, 2]. We designed an error concealment technique for lost motion vectors of H.264 video coding. In this paper, we propose a Kalman filter based motion vector recovery scheme, and experimented with standard video sequences. The experimental results show that our scheme restores original motion vector with more precision of 0.91 - 1.12 on average over conventional H.264 decoding with no error recovery.

On Alternative Path Setup for Directional Antenna Based Mobile Ad Hoc Networks (방향성 안테나에 기반을 둔 이동 애드 혹 네트워크에서의 대체 경로 설정)

  • Tscha, Yeong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1165-1174
    • /
    • 2007
  • Mobile ad hoc networks suffer from the re-construction of the routing path as a node on the path moves away and/or fails. In this paper we propose a multipath routing scheme, designed for the network based on the directional antennas, in which a new path is quickly recovered by do-touring to an alternative neighbor called braid. Simulations are conducted in random networks with 50 nodes uniformly deployed in a $1,000m{\times}1,000M$ area where, all nodes have a transmission range of 250m and the average node moving speed varies from 0 to 10m/s. The proposed approach under the ideal antenna with K(>1) directional sectors achieves better results compared with the case of K=1, the omnidirectional antenna model, in terms of the metrics: packet delivery ratio and average number of hops for the routing paths. As further study, a scheme to alleviate the heavy amount of latency accompanied by the rout setup is urgently required.

  • PDF

FPGA Implementation of a Burst Cell Synchroniser for the ATM-PON Upstream (ATM-PON의 상향에서 버스트 셀 동기장치의 FPGA 구현)

  • Kim, Tae-Min;Chung, Hae;Shin, Gun-Soon;Kim, Jin-Hee;Sohn, Soo-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.1-9
    • /
    • 2001
  • In the APON(ATM Passive Optical Network), the transmission of the upstream traffic is based on a TDMA(Time Division Multiple Access) method that an OLT(Optical Line Termination) permits ONUs(Optical Network Units) sending cells by allocating time slots. Because the upstream is not a streaming mode, the cell synchronizer has to be operated in the burst mode. Also, the cell phase monitor is required to prevent collisions between cells which are transmitted by multiple ONUs through a single optical fiber. In this paper, a TDMA burst cell synchroniser is implemented with the FPGA(Field Programmable Gate Array) being used in the APON based on G.983.1 for transmitting upstream cells. It has two main functions which are the upstream data recovery and the phase monitoring. The former is to recover the upstream data and clock in the OLT by seeking the preamble which is the overhead of the upstream time slot and by aligning the phase of the bit and cell with the system clock. The latter is to provide the information to the ONU to compensate for the equalization delay by monitoring continuously the phase difference between adjacent cells to avoid the cell collision on the upstream.

  • PDF