• Title/Summary/Keyword: ARP

Search Result 150, Processing Time 0.025 seconds

The Propose of Requirements Based on Safety Assessment for UAV Handover

  • Seung, Young-Min;An, Kyeong-Soo;Kim, Woo-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.91-97
    • /
    • 2019
  • Recently, UAV manufacturers are developing UAV system in a form that can be controlled by CS regardless of UAV kind and using STANAG 4586 interface standard considering Interoperability. STANAG 4586 is a NATO military standard developed to control various UAVs with standardized equipment. In such a case, UAV handover will inevitably occur and it is one of the most important function for safe UAV flight in platform using STANAG 4586. In the future combat situation where collaboration between AV and UAV is anticipated, seamless handover of UAV is a part of continuous research. In this paper, we propose requirements for UAV handover based on ARP 4761 safety assessment and analyze feasibility of the requirements by comparing UAV handover process in STANAG 4586. As a result of the comparative analysis, the proposed handover requirements based on ARP 4761 includes all the handover procedures of STANAG 4586 and present additional considerations for SOP creation and CS development. Applying the proposed handover requirements in the UAV development process can reduce the probability of loss of UAV control over the handover process and it can be expected to help improve the safety of UAV.

A Simulation Model for the Intermittent Hydrologic Process(I) - Alternate Renewal Process (ARP) and Continuous Probability Distribution - (간헐(間歇) 수문과정(水文過程)의 모의발생(模擬發生) 모형(模型)(I) - 교대재생과정(交代再生過程)(ARP)과 연속확률분포(連續確率分布) -)

  • Lee, Jae Joon;Lee, Jung Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.3
    • /
    • pp.509-521
    • /
    • 1994
  • This study is an effort to develop computer simulation model that produce precipitation patterns from stochastic model. A stochastic model is formulated for the process of daily precipitation with considering the sequences of wet and dry days and the precipitation amounts on wet days. This study consists of 2 papers and the process of precipitation occurrence is modelled by an alternate renewal process (ARP) in paper (I). In the ARP model for the precipitation occurrence, four discrete distributions, used to fit the wet and dry spells, were as follows; truncated binomial distribution (TBD), truncated Poisson distribution (TPD), truncated negative binomial distribution (TNBD), logarithmic series distribution (LSD). In companion paper (II) the process of occurrence is developed by Markov chain. The amounts of precipitation, given that precipitation has occurred, are described by a Gamma. Pearson Type-III, Extremal Type-III, and 3 parameter Weibull distribution. Daily precipitation series model consists of two models, A-Wand A-G model, by combining the process of precipitation occurrence and a continuous probability distribution on the precipitation of wet days. To evaluate the performance of the simulation model, output from the model was compared with historical data of 7 stations in the Nakdong and Seomjin river basin. The results of paper (1) show that it is possible to design a model for the synthetic generation of IX)int precipitation patterns.

  • PDF

Alveolar Ridge Preservation of Maxillary Molars for Implant Placement Without Sinus Lift Surgery: Case series (상악동 거상술을 동반하지 않는 치조제 보존술: 증례연구(Case series))

  • Cho, Hag-Yeon;Suh, Chang-Wan;Duong, Hieu Pham;Lee, Sung-Jo;Cho, In-Woo;Shin, Hyun-Seung;Koo, Ki-Tae;Fickl, Stefan;Park, Jung-Chul
    • Implantology
    • /
    • v.22 no.4
    • /
    • pp.220-235
    • /
    • 2018
  • Sinus lift procedure is frequently required for the maxillary molar implant placement. Previous studies have demonstrated alveolar ridge preservation (ARP) can maintain the dimensions of ridge height and width. However, there is a lack of studies which evaluated the effect of ARP to avoid sinus lift procedure. Purpose of this study is to describe a method reducing the need of sinus lift surgery by ARP in maxillary molar areas and to assess the feasibility clinically, radiologically and histologically. Ten maxillary molars in ten patients had severe vertical bone resorption with minimal residual bone height. They were considered having the high possibility of the necessity of sinus lift procedure for dental implant after the extraction. After extraction, open healing ARP with deproteinized bovine bone mineral mixed with 10% collagen and resorbable collagen membranes was performed. After sufficient healing, dental implants were placed, and evaluated clinically and radiologically. Histological observation was conducted just before the implantation in one patient. Implants were successfully placed without sinus lift in all ten cases. All the implants were restored with no sign of complications, and patients are now in a close follow-up up to 20 months post-loading. Histological observation showed minimal inflammatory reaction and newly formed bone was substantially noted. The ARP technique has successfully avoided the sinus lift surgeries. It appears that this procedure may improve the simplicity of the clinical process for the clinicians and reduce the discomfort of patients.

Development of Embedded Network Processor (임베디드 네트웍용 프로세서 개발)

  • 유문종;최종운
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.6
    • /
    • pp.1078-1082
    • /
    • 2001
  • This is an example of ABSTRACT format. We made a HTTP server using 8 bit microprocessor It was TMP84c015 which applied a z80 core and RTL8019AS was installed for an ethernet physical layer. Assembly language was used to optimized a performance of the MPU, to overcome an restriction of memory sire and to maximize the throughput of packet using TCP, UDP, IP, ICMP, ARP protocol. We used LabVIEW to verify the each protocol on the client side.

  • PDF

QSO Candidates in Leo Triplet Field

  • 신윤경;변용익
    • Bulletin of the Korean Space Science Society
    • /
    • 2003.10a
    • /
    • pp.86-86
    • /
    • 2003
  • We present intermediate-band spectral energy distribution (SED) of QSO candidates in Leo Triplet field. Leo Triplet is composed of three galaxies, NGC3623, 3627, and 3628 which appear to interact with each other. Based on X -ray information, Arp et al. (2002) selected QSO candidates and suggested that the known QSOs and these candidates might belong to the triplet system in spite of their apparent high redshift. Our photometry is based on BATC survey data, which consist of hundreds of 15 intermediate-band images. In order to derive SED of high signal to noise ratio for every sources in the field, we have combined images of the same filter and matched the sources in the combined images. QSO candidates were identified based on the shape of derived SED curves. We compare our results with Arp et al. (2002)'s QSO candidates.

  • PDF

A Study on Vulnerability Analysis and Security Plan through Public WiFi Attack (공공 와이파이 공격을 통한 취약점 분석 및 보안방안에 관한 연구)

  • Cho, Young-nam;Jo, Jeong-won;Jeong, Chae-eun;Kang, Da-seul;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.493-496
    • /
    • 2018
  • Wi-Fi Protected Access2 (WPA2), a recommended Wi-Fi communication security technology, vulnerabilities are found and Users' personal information may also be exposed. In this paper, we analyze security vulnerabilities of public Wi-Fi by attack and seek to find ways to securely use Wi - Fi by users.

  • PDF

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

Implementation of a security system using the MITM attack technique in reverse (MITM 공격기법을 역이용한 보안시스템 구현)

  • Rim, Young-woo;Kwon, Jung-jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.79-80
    • /
    • 2021
  • 본 논문은 MITM 공격기법을 역이용한 네트워크 보안 기술 및 구현 방안을 제시한다. MITM(Man In The Middle) 공격은 통신 경로 중간에 개입하여 양 단간의 통신 내용을 가로채거나 행위 제어를 수행하는 전통적인 해킹 방법으로 그 공격 기법을 역이용하여 네트워크 공격을 방어하는 보안기술 및 시스템 구현에 대해 기술한다. Linux 시스템을 이용하여 ARP Poisoning을 통해 양단간 통신 트래픽에 개입하며, Netfilter 및 Suricata를 이용하여 Network IDS/IPS 및 Firewall을 구현하였고, Contents 필터링 및 Anti-Virus 구현이 가능하며, 여러 기능을 확장하여 UTM(Unified Threats Management) 시스템을 구현하였다.

  • PDF