• Title/Summary/Keyword: 차분데이터

Search Result 213, Processing Time 0.036 seconds

The development of a back analysis program for subsea tunnel stability under operation: transversal tunnel section (운영 중 해저 터널의 안정성 평가를 위한 역해석 프로그램 개발: 횡단방향)

  • An, Joon-Sang;Kim, Byung-Chan;Lee, Sang-Hyun;Song, Ki-Il
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.2
    • /
    • pp.195-212
    • /
    • 2017
  • When back analysis is used for the assessment of an operating subsea tunnel safety in various measurement information such as stress, water pressure and tunnel lining and ground stiffness degradation, the reliable results within tolerable error rate can be obtained. By utilizing a commercial geotechnical analysis program FLAC3D, back analysis can be performed with a DEA which has already been successfully validated in previous studies. However, relative more time-consumption is the drawback of this approach. For this reason, this study introduced beam-spring model-based on FEM solver which uses less analysis time relatively. Beam-spring program capable of structural analysis of a circular tunnel section was developed by using Python language and combined with the built-DEA. From the measurement datum, expected to estimate the stability of an operation tunnel close to real-time.

SITM Attacks on Skinny-128-384 and Romulus-N (Skinny-128-384와 Romulus-N의 SITM 공격)

  • Park, Jonghyun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.807-816
    • /
    • 2022
  • See-In-The-Middle (SITM) is an analysis technique that uses Side-Channel information for differential cryptanalysis. This attack collects unmasked middle-round power traces when implementing block ciphers to select plaintext pairs that satisfy the attacker's differential pattern and utilize them for differential cryptanalysis to recover the key. Romulus, one of the final candidates for the NIST Lightweight Cryptography standardization competition, is based on Tweakable block cipher Skinny-128-384+. In this paper, the SITM attack is applied to Skinny-128-384 implemented with 14-round partial masking. This attack not only increased depth by one round, but also significantly reduced the time/data complexity to 214.93/214.93. Depth refers to the round position of the block cipher that collects the power trace, and it is possible to measure the appropriate number of masking rounds required when applying the masking technique to counter this attack. Furthermore, we extend the attack to Romulus's Nonce-based AE mode Romulus-N, and Tweakey's structural features show that it can attack with less complexity than Skinny-128-384.

정밀단독측위를 이용한 저궤도위성의 궤도결정 정밀도 분석

  • Choe, Jong-Yeon;Lee, Sang-Jeong
    • Bulletin of the Korean Space Science Society
    • /
    • 2011.04a
    • /
    • pp.25.2-25.2
    • /
    • 2011
  • 저궤도위성의 정밀궤도결정은 GPS 위성과 수신기의 시계 공통오차를 제거하기 위해 이중 차분하는 방법으로 요구된 위치 정밀도를 충족시켜왔다. 그러나 빠른 속도로 지구를 회전하는 저궤도위성의 정밀궤도결정에 있어 이러한 이중 차분방법은 지구상에 광범위하게 분포된 지상 IGS 망 처리에 많은 계산 부담을 안고 있다. 그리고 지상 측지뿐만 아니라 저궤도위성을 이용한 기상관측 또는 긴급한 영상 처리 응용분야에서도 고정밀도 준실시간(Near Real Time-NRT) 처리가 요구되고 있다. 고정밀 준실시간 정밀궤도결정을 위한 대안은 이중주파수 GPS 수신기으로 IGS에서 제공되는 정밀궤도력을 갖고 고정밀 단독측위가 가능한 정밀단독측위(precise point positioning) 기법으로 상대측위와 버금가는 위치 정밀도를 얻을 수 있다. 다목적실용위성 5호는 고정밀 합성 레이더 영상 처리를 위해서 요구되는 20 cm 위성 위치 정밀도를 만족시키고, 대기 기상관측을 위해 GPS 전파 엄폐 측정값 수집을 목적으로 고정밀 이중주파수 GPS 수신기(Integrated GPS and Occultation Receiver, IGOR)를 탑재하고 있다. 이 논문에서는 IGOR의 이전 제품인 Blackjack 수신기를 탑재한 GRACE 위성의 실제 GPS 데이터를 사용하여 대략 3 ~ 5cm의 위치 정밀도를 얻었다. 준실시간 정밀궤도결정에서 정밀도 손실없이 궤도결정 처리 지연시간(latency)을 줄이는 것이 중요하다. 이 지연시간은 GPS 측정값의 양에 따라 크게 좌우되기에 GPS 측정값 샘플링 주기를 10초에서 640초까지 변화시켜가면서 정밀도를 분석한 결과, 위치 정밀도 손실없이도 궤도결정처리 지연시간을 단축시킬 수 있음을 제시하고 있다.

  • PDF

A Study on the Speech Packetized Coding by Zero Bit Reduction of 1'st Order Differences (1차 차분신호의 영비트 제거에 의한 음성신호의 패킷부호화에 관한 연구)

  • Shin, Dong-Jin;Lim, Un-Cheon;Bae, Myung-Jin;Ann, Sou-Guil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.8 no.4
    • /
    • pp.74-82
    • /
    • 1989
  • In this paper, we have studied on the methodologies of implementation and the performance evaluations about the real-time packetized coding of multi-channel speech signals. Our suggested coding algorithm is very, simple and it has majorly the data handling operations rather than the numerical calculations. And it gives about $40\%$ of compression ratio with less than the conventional codings. Nevertheless, using this algorithm, we can save the memories for the speech signal and we can raise the efficiency of the channel transmission. Especially because of its simplicity of algorithm, we can easily obtain the merits of the multi-channel operations.

  • PDF

A Video Browser for a Contents Management System (Contents Management System을 위한 비디오 브라우저)

  • Ban, Jae-Min;Lew, Sheen;Lee, Wan-Joo;Lee, Byeong-Rae;Kang, Hyun-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1470-1476
    • /
    • 2012
  • Performance of a video browser greatly depends on the performance of scene change detection for the efficient retrieval and storage of the video contents which are major data in a current contents management system. In this paper we propose a new scene change detection method using Mean Difference Histogram of each frame section which improves accuracy of scene change detection as well as reduces the frequency of miss detection and fault detection of gradual scene change which is one of critical problem of the conventional histogram-based techniques.

Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure (블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석)

  • Bae, Daehyeon;Nam, Seunghyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.39-49
    • /
    • 2020
  • In this paper, we show that the Chinese standard block cipher SM4 is vulnerable to the side channel attacks and present a countermeasure to resist them. We firstly validate that the secret key of SM4 can be recovered by differential power analysis(DPA) and correlation power analysis(CPA) attacks. Therefore we analyze the vulnerable element caused by power attack and propose a first order masking-based countermeasure to defeat DPA and CPA attacks. Although the proposed countermeasure unfortunately is still vulnerable to the profiling power attacks such as deep learning-based multi layer perceptron(MLP), it can sufficiently overcome the non-profiling attacks such as DPA and CPA.

Outlier Detection in Time Series Monitoring Datasets using Rule Based and Correlation Analysis Method (규칙기반 및 상관분석 방법을 이용한 시계열 계측 데이터의 이상치 판정)

  • Jeon, Jesung;Koo, Jakap;Park, Changmok
    • Journal of the Korean GEO-environmental Society
    • /
    • v.16 no.5
    • /
    • pp.43-53
    • /
    • 2015
  • In this study, detection methods of outlier in various monitoring data that fit into big data category were developed and outlier detections were conducted for both artificial data and real field monitoring data. Rule-based methods applied rate of change and probability of error for monitoring data are effective to detect a large-scale short faults and constant faults having no change within a certain period. There are however, problems with misjudgement that consider the normal data with a large scale variation as outlier caused by using independent single dataset. Rule-based methods for noise faults detection have a limit to application of real monitoring data due to the problem with a choice of proper window size of data and finding of threshold for outlier judgment. A correlation analysis among different two datasets were very effective to detect localized outlier and abnormal variation for short and long-term monitoring dataset if reasonable range of training data could be selected.

Daily Stock Price Prediction Using Fuzzy Model (퍼지 모델을 이용한 일별 주가 예측)

  • Hwang, Hee-Soo
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.603-608
    • /
    • 2008
  • In this paper an approach to building fuzzy model to predict daily open, close, high, and low stock prices is presented. One of prior problems in building a stock prediction model is to select most effective indicators for the stock prediction. The problem is overcome by the selection of information used in the analysis of stick-chart as the input variables of our fuzzy model. The fuzzy rules have the premise and the consequent, in which they are composed of trapezoidal membership functions, and nonlinear equations, respectively. DE(Differential Evolution) searches optimal fuzzy rules through an evolutionary process. To evaluate the effectiveness of the proposed approach numerical example is considered. The fuzzy models to predict open, high, low, and close prices of KOSPI(KOrea composite Stock Price Index) on a daily basis are built, and their performances are demonstrated and compared with those of neural network.

FDTD Modeling of the Korean Human Head using MRI Images (MRI 영상을 이용한 한국인 인체 두부의 FDTD 모델링)

  • 이재용;명노훈;최명선;오학태;홍수원;김기회
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.4
    • /
    • pp.582-591
    • /
    • 2000
  • In this paper, the Finite-Difference Time-Domain(FDTD) modeling method of the Korean human head is introduced to calculate electromagnetic energy absorption for the human head by mobile phones. After MRI scanning data is obtained, 2 dimensional(2D) segmentation is done from the 2D MRI image data by the semi-automatic method. Then, 3D dense segmentation data with $1mm\times1mm\times1mm$ is constructed from the 2D segmentation data. Using the 3D segmentation data, coarse FDTD models of human head that is tilted arbitrarily to model the condition of tilted usage of mobile phone.

  • PDF

Study on the Improvement of the Positioning Accuracy for Inverted RTK Using FARA (FARA를 이용한 Inverted RTK 측위 정확도 향상에 대한 연구)

  • Choi Byung Kygu;Lim Sam Sung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.3
    • /
    • pp.217-223
    • /
    • 2004
  • In order to improve real-time positioning accuracy, a number of methods have been tested and one of those is the inverted RTK(Real-time kinematic) that gives a precise positioning by handling carrier phase measurements. For the inverted RTK positioning, it needs the L1 phase measurement at least for 1~2 minutes and the additional reference stations/communication system and a data processing server are required. The L1 code and carrier phase measurements for real-time application are used simultaneously and then Kalman filter is applied to estimate integer ambiguities. Double differenced integer ambiguities are resolved by utilizing the FARA(Fast Ambiguity Resolution Approach). In this paper, we propose the method to improve the positioning accuracy and performed the field tests for several baselines from DAEJ reference station in KAO(Korea Astronomy Observatory).