• Title/Summary/Keyword: 코드 배치

Search Result 97, Processing Time 0.025 seconds

Recognizing that a person doesn't put on a safety cap using DSP. (DSP(Digital signal proccesor)를 이용한 산업현장에서의 안전모 미착용 인식 기술)

  • Lee, Yong-Woog;Song, Kang-Suk;Jeong, Moo-Il;Lim, Chul-Hoo;Moon, Sung-Mo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.530-533
    • /
    • 2009
  • This paper proposes a method of recognizing that a person doesn't put on a safety cap using image processing method in DSP(Digital Signal Processor). It processes inputted images by image input devices that equipped in a industrial settings. If the method recognizes a person that doesn't put on a safety cap, a system transfers relevant recognition result to a supervisor and takes proper measures. If an accident happens and someone doesn't put on a safety cap, additional casualities could be. Proposed method can nip additional casualties in the bud. To recognize that a person don't put on a safety cap, images are processed by object abstraction, removal of noise, decision of a thing or a person, abstraction of a head part in a image, recognizing whether a man puts on a safety cap using HSV color space or not, and so on. Image input and image process are processed by DSP. And C language-based codes are optimized by an eignefunction(Intrinsics) for speed improvement of algorithms.

  • PDF

Design of Binary Constant Envelope System using the Pre-Coding Scheme in the Multi-User CDMA Communication System (다중 사용자 CDMA 통신 시스템에서 프리코딩 기법을 사용한 2진 정진폭 시스템 설계)

  • 김상우;유흥균;정순기;이상태
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.486-492
    • /
    • 2004
  • In this paper, we newly propose the binary CA-CDMA(constant amplitude CDMA) system using pre-coding method to solve the high PAPR problem caused by multi-user signal transmission in the CDMA system. 4-user CA-CDMA, the basis of proposed binary CA-CDMA system, makes binary output signal for 4 input users. It produces the output of binary(${\pm}$2) amplitude by using a parity signal resulting from the XOR operation of 4 users data. Another sub-channel or more bandwidth is not necessary because it is transmitted together with user data and can be easily recovered in the receiver. The extension of the number of users can be possible by the simple repetition of the basic binary 4-user CA-CDMA. For example, binary 16-user CA-CDMA is made easily by allocating the four 4-user CA-CDMA systems in parallel and leading the four outputs to the fifth 4-user CA-CDMA system as input, because the output signal of each 4-user CA-CDMA is also binary. By the same extension procedure, binary 64 and 256-user CA-CDMA systems can be made with the constant amplitude. As a result, the code rate of this proposed CA-CDMA system is just 1 and binary CA-CDMA does not change the transmission rate with the constant output signal(PAPR = 0 ㏈). Therefore, the power efficiency of the HPA can be maximized without the nonlinear distortion. From the simulation results, it is verified that the conventional CDMA system has multi-level output signal, but the proposed binary CA-CDMA system always produces binary output. And it is also found that the BER of conventional CDMA system is increased by nonlinear HPA, but the BER of proposed binary CA-CDMA system is not changed.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Analysis of the Engagement Effects of DIRCM against a Man Portable Air Defense System (휴대용대공유도탄에 대응하는 지향성적외선방해장비의 교전효과 분석)

  • Jeong, Chunsik
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A MANPADS(Man Portable Air Defense System), which tracks infrared energy, is light enough for individuals to carry and can against to a variety of aircraft, making it widely deployed around the world, posing a major threat to aircraft. A flare has been developed as an IRCM(Infrared Countermeasures) that protects the life of friendly aircraft and combatants by deceiving such guided missiles. However, DIRCM, which can overcome the problems of existing IRCM, is being developed mainly in some developed countries, and the need for it has been increasing gradually. This paper modeled first generation IR seeker of AM modulation method, the second generation IR seeker of FM modulation method, and the third generation IR seeker of pulse modulation method among various MANPADS, and modeled the scattering light phenomenon in the seeker when laser beams are investigated in DIRCM. Using this, jamming simulations were performed in various engagement environments of the MANPADS and aircraft equipped with DIRCM, and the miss distance of the guided missiles and aircraft were analyzed. Simulation results show that DIRCM, which irradiates a modulated laser beam with one jamming code, deceives both first, second and third generation MANPADS at 1km and 2km of engagement distance. In particular, the survival rate of aircraft equipped with DIRCM increased when the distance of engagement increased from 1km to 2km, and the survival rate was at least 99% at 2km of engagement distance.

Path Algorithm for Maximum Tax-Relief in Maximum Profit Tax Problem of Multinational Corporation (다국적기업 최대이익 세금트리 문제의 최대 세금경감 경로 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.157-164
    • /
    • 2023
  • This paper suggests O(n2) polynomial time heuristic algorithm for corporate tax structure optimization problem that has been classified as NP-complete problem. The proposed algorithm constructs tax tree levels that the target holding company is located at root node of Level 1, and the tax code categories(Te) 1,4,3,2 are located in each level 2,3,4,5 sequentially. To find the maximum tax-relief path from source(S) to target(T), firstly we connect the minimum witholding tax rate minrw(u, v) arc of node u point of view for transfer the profit from u to v node. As a result we construct the spanning tree from all of the source nodes to a target node, and find the initial feasible solution. Nextly, we find the alternate path with minimum foreign tax rate minrfi(u, v) of v point of view. Finally we choose the minimum tax-relief path from of this two paths. The proposed heuristic algorithm performs better optimal results than linear programming and Tabu search method that is a kind of metaheuristic method.

A Comparative Study on the Change in Oriental Linked pearls Pattern (동전(東傳) 연주문의 변천과정 비교연구 -5세기~10세기 벽화복식 및 출토 직물을 중심으로-)

  • An, Bo-yeon
    • Korean Journal of Heritage: History & Science
    • /
    • v.40
    • /
    • pp.243-270
    • /
    • 2007
  • Linked pearls pattern expressed on textiles have no limited scale or shape when manufacturing, so they are free in expression. And from the design, material, and color we can analogize the social culture of that age. Oriental linked pearls pattern was started from the Sasanian Persia and introduced through the Silk Road, so it is closely connected with the East and the West culture. This study will consider from the 5th century to the 10th century; the mural costume of the West Central Asia, the ancient textiles excavated from the Sinjiang and Qinghai area of China, and the linked pearls pattern which are collected at Shosoin, Japan. And from this study, will concentrate on clarifying the linked pearls pattern's condition of the cultural exchange between the East and the West and it's structural variation process. The design of linked pearls pattern delivered to the East through the Silk Road is differed by area. For example, in the Western Pamir Plateau, where the ancient Sogdians mainly lived, the excavated linked pearls pattern's subject were deer or cassowary variated from the West Asian motif. But the ones excavated from Kucha Xingang had Chinese motifs added so they showed Chinese characters or Buddhist Bodhisattva image instead of Helios. Like this, the appearance of new patterns, which were accompanied by structural variations, gradually deviated from the standardized pattern of the Sasanian Persia. And this structural variation process has relations with the construction and arrangement method of various patterns of the after ages. The foliated floral Spray, which is placed at the lozenge space of linked pearls' space, had developed into ogival - shaped pattern (Neunghwamun). And the prevalence of geometrical structure pattern after the 10th century and the unfolding method of Tapjamun which is arranging unit pattern in order, are similar to the linked pearl pattern. In brief, linked pearls pattern accompanied by technical improvement let us understand the polished artistic code from its expression, and has importance in showing universal pattern beyond region and culture.