• Title/Summary/Keyword: 중간평가

Search Result 1,236, Processing Time 0.025 seconds

A Study on Fake Data Filtering Method of CCN (콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.155-163
    • /
    • 2014
  • To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.

Synthesis of Hollow Carbon Microspheres with Mesoporous Shell and Vacant Core Structure and Their Electrochemical Properties (중간세공을 갖는 껍질로 구성된 속이 빈 마이크로 탄소입자의 합성 및 이들의 전기화학적 특성)

  • Lee, Yae Won;Yang, Hee Chun;Kim, Geon-Joong
    • Applied Chemistry for Engineering
    • /
    • v.27 no.4
    • /
    • pp.449-454
    • /
    • 2016
  • In this study, highly monodispersed porous carbon microcapsules with a hollow core were synthesized using polystyrene (PS) beads as a hard template. The surface of PS was first modified with polyvinylpyrollidone (PVP) for the easy attachment of inorganic silica sol. After coating the surface of PVP modified PS microspheres with SBA-16 sol, the carbon microcapsules with a hollow macroporous core were fabricated through reverse replication method by filling carbon sources in the mesopores of silica mold. The hollow carbons having a mesoporous shell structure and narrow particle size distribution could be obtained after the carbonization of carbon source and the dissolution of silica mold by HF solution. The mesoporous characteristics and electrochemical properties of hollow carbon microcapsules were characterized by XRD, SEM, TEM, $N_2$ adsorption/desorption analysis and cyclic voltammetry. They showed the high electric conductivity and capability for use as efficient electro-materials such as a supercapacitor.

The Industrial Economic Costs of Unsupplied Electricity in OECD Countries using Input-Output Analysis (산업연관분석을 활용한 전력의 산업별 공급지장비용 평가 : OECD 국가를 중심으로)

  • Lee, Seung-Jae;Jeong, Dong-Won;Yu, Jae-Gab
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.191-198
    • /
    • 2016
  • As the electricity produced from the electricity industry, a national key industry in Korea, are supplied to other industries as an intermediate goods, the supply shortage of electricity industry has a large impact on the national economy. This paper attempts to analyze the supply shortage effects which are defined as the negative impact of one won of supply failure in the electricity on the production of other industries. To this end, an input-output analysis using an input-output (I-O) table describing inter-industry flow of intermediate goods is applied. More concretely, the supply-driven model is applied subject to the OECD countries. The value of the supply effects interfere with Denmark's best large 1.682 was followed by South Korea, Japan, Australia, the UK.

Size Fractionation of Cellulose Nanofibers by Settling Method and Their Morphology (셀룰로오스 나노섬유의 중력침강법에 의한 치수분획 및 형태학적 성질)

  • Park, Chan-Woo;Han, Song-Yi;Lee, Seung-Hwan
    • Journal of the Korean Wood Science and Technology
    • /
    • v.44 no.3
    • /
    • pp.398-405
    • /
    • 2016
  • The cellulose nanofibers (CNFs) were prepared by wet disk-milling (WDM) and fractionated by settling method into supernatant, middle and sediment fractions. The diameter and its distribution of the fractionated CNFs were investigated. With increasing WDM passing number, precipitation became delayed. Weight fraction at sediment fraction was decreased, whereas those at supernatant and middle fractions were increased with increasing WDM passing number. Diameter distribution of CNFs at supernatant fraction was narrowest and became broaden at middle and sediment fraction. Filtration time was longer in order of supernatant, middle and sediment fraction.

User Signature Protection Model for Different Cloud Areas (이질적인 클라우드 환경에 적합한 사용자 서명 보호 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.23-28
    • /
    • 2019
  • Cloud services are services developed to serve a wider variety of users in different fields. However, although cloud services are designed to reflect the needs of different users, a variety of security damages resulting from them are increasing and technologies are needed to address them. This paper proposes a user signature management model that prevents third parties from exploiting the user's signature in a heterogeneous cloud The proposed model strengthens the functionality of the intermediate devices that make up the hierarchical cloud while also managing the signature information of the partitioned user. As a result of the performance assessment, the proposed model not only distributed user signature management, but also improved efficiency by 8.5% on average because intermediate devices distributed user signature processing, and reduced the user's signature latency by 13.3% on average when performing user authentication processing. On average, the overhead generated by intermediate devices processing a user's signature was 10.1 percent lower than that of conventional techniques.

A Study on the Recognition of Korean Numerals Using Recurrent Neural Predictive HMM (회귀신경망 예측 HMM을 이용한 숫자음 인식에 관한 연구)

  • 김수훈;고시영;허강인
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.8
    • /
    • pp.12-18
    • /
    • 2001
  • In this paper, we propose the Recurrent Neural Predictive HMM (RNPHMM). The RNPHMM is the hybrid network of the recurrent neural network and HMM. The predictive recurrent neural network trained to predict the future vector based on several last feature vectors, and defined every state of HMM. This method uses the prediction value from the predictive recurrent neural network, which is dynamically changing due to the effects of the previous feature vectors instead of the stable average vectors. The models of the RNPHMM are Elman network prediction HMM and Jordan network prediction HMM. In the experiment, we compared the recognition abilities of the RNPHMM as we increased the state number, prediction order, and number of hidden nodes for the isolated digits. As a result of the experiments, Elman network prediction HMM and Jordan network prediction HMM have good recognition ability as 98.5% for test data, respectively.

  • PDF

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.

Influence of the Intermediate Principal Stress on Behavior of Overconsolidated Clay (중간주응력(中間主應力)이 과압밀점토(過壓密粘土)의 거동(擧動)에 미치는 영향(影響))

  • Hong, Won Pyo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.8 no.2
    • /
    • pp.99-107
    • /
    • 1988
  • A limited number of cubical triaxial tests with independent control of the three principal stresses were performed on an overconsolidated clay. The cubical undisturbed specimens with overconsolidation ratio of 5 were prepared in triaxial chamber after sampling in field. It was found that the intermediate principal stress influences on the stress-strain, undrained strength effective strength, effective friction angle and pore pressure of the overconsolidated clay. When the magnitude of the intermediate principal stress is not same as the minimum principal stress, the failure strength of the overconsolidated clay is underestimated by use of Mohr-Coulomb failure criterion while it can be estimated quite well by use of Lade failure criterion. And the undrained strength of the overconsolidated clay does not coincide with that obtained by Tresca failure criterion.

  • PDF

Dose Assessment in Accordance with the Measured Position of Size Specific Dose Estimates (Size Specific Dose Estimates(SSDE)측정 위치에 따른 피폭선량 평가)

  • Kim, Jung-Su;Hong, Sung-Wan;Kim, Jung-Min
    • Journal of radiological science and technology
    • /
    • v.38 no.4
    • /
    • pp.383-387
    • /
    • 2015
  • This study investigated the size specific dose estimates of difference localizer on pediatric CT image. Seventy one cases of pediatric abdomen-pelvic CT (M:F=36:35) were included in this study. Anterior-posterior and lateral diameters were measured in axial CT images. Conversion factors from American Association of Physicists in Medicine (AAPM) report 204 were obtained for effective diameter to determine size specific dose estimate (SSDE) from the CT dose index volume (CTDIvol) recorded from the dose reports. For the localizer of mid-slice SSDE was 107.63% higher than CTDIvol and that of xiphoid-process slices SSDE was higher than 92.91%. The maximum error of iliac crest slices, xiphoid process slices and femur head slices between mid-slices were 7.48%, 17.81% and 14.04%. In conclusion, despite the SSDE of difference localizer has large number of errors, SSDE should be regarded as the primary evaluation tool of the patient radiation in pediatric CT for evaluation.