• Title/Summary/Keyword: Checking

Search Result 3,153, Processing Time 0.028 seconds

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.

Kinematic Comparative Analysis of Short Turns between Skilled and Unskilled Alpine Skiers

  • Jo, Hyun Dai
    • Korean Journal of Applied Biomechanics
    • /
    • v.29 no.4
    • /
    • pp.219-226
    • /
    • 2019
  • Objective: The purpose of this study is to provide a better understanding of short turn mechanism by describing short turns after kinematic analysis and provide skiers and winter sports instructors with data through which they are able to analyze right postures for turns in skiing in a systematic, rational and scientific manner. Method: For this, a mean difference of kinematic variables (ski-hip angle, ski-shoulder twist angle, pole checking angle, the center of gravity (CG) displacement, trunk forward lean angle) was verified against a total of 12 skiers (skilled and unskilled, 6 persons each), regarding motions from the up-start to down-end points for short turns. Results: There was no difference in a ski-hip twist angle. The ski-shoulder twist angle was large at the up-start point while a pole-checking angle was high at the down-end point in skilled skiers. Concerning the horizontal displacement of CG, skilled skiers were positioned on the right side at the upstart point. No significant difference was observed in the trunk forward lean angle. Conclusion: According to the ski-shoulder twist angle and CG horizontal displacement results, the upper body should be kept leant toward the pole. In addition, big turns should be made via edging and angulation. During pole checking, the hand holding the pole should be thrown and released toward a vector direction of the forearm.

New Path Planning Algorithm based on the Visibility Checking using a Quad-tree on a Quantized Space, and its improvements (격자화된 공간상에서 4중-나무 구조를 이용한 가시성 검사를 바탕으로 한 새로운 경로 계획 알고리즘과 그 개선 방안들)

  • Kim, Jung-Tae;Kim, Dai-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.1
    • /
    • pp.48-52
    • /
    • 2010
  • In this paper, we introduce a new path planning algorithm which combines the merits of a visibility graph algorithm and an adaptive cell decomposition. We quantize a given map with empty cells, blocked cells, and mixed cells, then find the optimal path on the quantized map using a visibility graph algorithm. For reducing the number of the quantized cells we use the quad-tree technique which is used in an adaptive cell decomposition, and for improving the performance of the visibility checking in making a visibility graph we propose a new visibility checking method which uses the property of the quad-tree instead of the well-known rotational sweep-line algorithm. For the more efficient visibility checking, we propose two additional improvements for our suggested method. Both of them are used for reducing the visited cells in the quad-tree. The experiments for a performance comparison of our algorithm with other well-known algorithms show that our proposed method is superior to others.

Behavior and stress check of concrete box girders strengthened by external prestressing

  • Zhang, Yu;Xu, Dong;Liu, Chao
    • Computers and Concrete
    • /
    • v.22 no.2
    • /
    • pp.133-142
    • /
    • 2018
  • The deterioration of existing bridges has become a major problem around the world. In the paper, a new model and an associated stress checking method are proposed for concrete box girders strengthened by external prestressing. The new model called the spatial grid model can analyze all the spatial behaviors clearly by transforming the box girder into discrete orthogonal grids which are equivalent to plate elements. Then the three-layer stresses are employed as the stress checking indices to evaluate the stress state of the plate elements. The initial stress check before strengthening reveals the cracked and potential cracking areas for existing bridges, making the strengthening design more targeted and scientific; the subsequent stress check after strengthening evaluates the strengthening effect and ensures safety. A deficient bridge is selected as the practical example, verifying the accuracy and applicability of the proposed model and stress checking method. The results show that principal stresses in the middle layer of plate elements reflect the main effects of external prestressing and thus are the key stress checking indices for strengthening. Moreover, principal stresses check should be conducted in all parts of the strengthened structure not only in the webs. As for the local effects of external prestressing especially in the areas near anchorage and deviator, normal stresses check in the outer and inner layers dominates and local strengthening measures should be taken if necessary.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

Solving Escapee-Chaser Game via Model Checking (모델 체킹을 이용한 도망자-추적자 게임 풀이)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of Korea Game Society
    • /
    • v.4 no.2
    • /
    • pp.13-20
    • /
    • 2004
  • We have been interested in solving escapee-chaser game. In this game, with avoiding chaser, the escapee must escape from given male. The winning strategies of the escapee are driving the chaser to an intended place and closely evading from chaser by using some walls. According to our experience, some stages of the game are too difficult to solve manually. So we take the model checking method to get a solution of the game. Because the model checking with breadth fist search manner exhaustively searches the all state space of the game, the solution using model checking is best solution, shortest path. Fortunately, during the process of finding solution path, the state space explosion problem didn't occur, and the results of the game solving was applied to embedded system, Lego Mindstorm. Two agents, escapee and chaser, were implemented into robots and several experiments conformed the correctness of our solution.

  • PDF

Automation of Inventory Checking System for Outdoor Warehouse (야외창고 재고실사 자동화를 위한 시스템 개발)

  • Bae, Sung Moon;Han, Kwan Hee;Lee, Hwa Yong;Hong, Kum Suk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • Inventory inspection is an important task to eliminate the inconsistency between real assets and inventory management systems, and it is performed periodically at the site. In the case of a large-sized property, it is mainly managed in an outdoor workshop or a warehouse. However, due to the large area of the outdoor area, it is relatively difficult to identify the quantity and location of the property and is also vulnerable to theft. To solve this problem, we proposed a method and system for performing a warehouse inventory inspection using an unmanned aerial vehicle (UAV) and Bluetooth low energy (BLE) beacons. The proposed method has the following advantages. First of all, if we carry out inventory inspection by utilizing UAV, we can minimize user's effort compared to existing methods. The method of recognizing the asset by attaching the BLE beacon is more costly than using the existing RFID technology, but it is advantageous because the recognition distance is increased and the battery life of the tag is drastically increased. We also designed a BLE beacon reader for the system and implemented a prototype to show the feasibility of the proposed system. The prototype is based on Genuino 101, which is a kind of arduino, and adds HM-10 and Neo-6m modules to provide Bluetooth and GPS functions. The BLE beacon reader was tested in outdoor, and attached in drone. We also developed an inventory checking system based on the web to display results of inventory checking. The proposed approach enables the users to automate the operation of inventory checking on an outdoor warehouse.

Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure (비교연산을 사용하지 않는 오류주입 공격에 안전한 CRT 기반의 RSA)

  • Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.17-25
    • /
    • 2008
  • Because Chinese Remainder Theorem based RSA (RSA CRT) offers a faster version of modular exponentiation than ordinary repeated squaring, it is promoting with standard. Unfortunately there are major security issues associated with RSA CRT, since Bellcore announced a fault-based cryptanalysis against RSA CRT in 1996. In 1997, Shamir developed a countermeasure using error free immune checking procedure. And soon it became known that the this checking procedure can not effect as the countermeasures. Recently Yen proposed two hardware fault immune protocols for RSA CRT, and this two protocols do not assume the existence of checking procedure. However, in FDTC 2006, the method of attack against the Yen's two protocols was introduced. In this paper, the main purpose is to present a countermeasure against the method of attack from FDTC 2006 for CRT-RSA. The proposed countermeasure use a characteristic bit operation and dose not consider an additional operation.

Analysis on a Minimum Infinity-norm Solution for Kinematically Redundant Manipulators

  • Insoo Ha;Lee, Jihong
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.130-139
    • /
    • 2002
  • In this paper, at first, we investigate existing algorithms for finding the minimum infinity-norm solution of consistent linear equations and then propose a new algorithm. The proposed algorithm is intended to includes the advantages of computational efficiency as well as geometric explicitness. As a practical application example, optimum trajectory planning for redundant robot manipulators is considered. Also, an efficient approach avoiding discontinuity in trajectory is proposed by resolving the non-uniqueness problem of minimum infinity-norm solution. To be specific, the proposed method for checking possible discontinuity does not need any other algorithms in checking the possibility of discontinuity while previous work needs specially designed checking courses. To show the usefulness of the proposed techniques, an example calculating minimum infinity-norm solution for comparing the computational efficiency as well as the trajectory planning for a redundant robot manipulator are included.

A Study on Implementation of Model Checking Program for Verifying LTS Specification (LTS 명세 검증을 위한 모델 검증기 개발)

  • Park, Yong-Bum;Kim, Tae-Gyun;Kim, Sung-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.995-1004
    • /
    • 1998
  • This paper presents an implementation of model checking tool for LTS process specification, which checks deadlock, livelock and reachability for the state and action. The implemented formal checker using modal mu-calculus is able to verify whether properties expressed in modal logic are true on specifications. We prove experimentally that it is powerful to check, safety and liveness for the state and action on LTS. The tool is implemented by $C^{++}$ language and runs on IBM PC under Windows NT.

  • PDF