• Title/Summary/Keyword: Cyber Range

Search Result 100, Processing Time 0.03 seconds

Performance Analysis of the UHF RFID Reader with the Range Correlation Effects of the Phase Noise (위상 잡음의 거리 상관 효과에 따른 UHF RFID 리더의 성능 분석)

  • Jang, Byung-Jun;Kang, Min-Soo;Lim, Jae-Bong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.2
    • /
    • pp.152-160
    • /
    • 2008
  • In this paper, we analyze the performance of a direct-conversion UHF RFID reader with the range correlation effects of the phase noise. Since a UHF RFIB system uses the same oscillator to generate the transmitted carrier and the local oscillation, the periodic interference and phase noise reduction effects occur due to time delay between two signals. Through exact theory and simulation, we verify how to cancel the periodic interference phenomena using I/Q diversity combining technique. And, we analyze phase noise reduction effects due to range correlation as a function of the tag-reader distance and the offset frequency Using these results, we simulate the symbol-error-rate performance with respect to phase noise with and without range correation effects. We show that the phase noise of the local oscillator has little effect on the symbol-error-rate performance because of phase noise reduction by range correlation.

A Study on Digital Culture Phenomenon Shown in the Modernly Fashion Design (현대 패션디자인에 나타난 디지털문화현상)

  • Kim, Jee-Hee
    • Fashion & Textile Research Journal
    • /
    • v.7 no.2
    • /
    • pp.143-152
    • /
    • 2005
  • A concept of 'digital' is changing a living pattern of moderners, with having influence on the whole life of modern society. The purpose of this study is arrange the frame of conformity to the 'fashion as culture' by considering the social and cultural phenomena being shown in relation to digital, which is a concept being watched most for the 21st century and by trying to analyze a tendency of digital culture being shown in the modernly fashion design based on this. The digital culture, which is a concept of generalizing the phenomena of interactional changes in the sub-structure being derived by digital technology, is being shown as a tendency of fusionization and globalization, and due to this, the culture of digital nomads is being formed. On the other hand, a tendency of amenity caused by the reaction against the coldly digital technology, is forming one axis of digital culture. As the culture, which experiences the process of a change by digital technology, is reflected even on the fashion, the fusion of technology and the human body, brought about the appearance and the development of the artificial body, by allowing the wearable computer to be introduced to fashion and by being connected directly to the body. This means the expansion of range for fashion. The destruction of a border between space and space, is making an opportunity of forming another ego inside the cyber space, with bringing about the mixed loading between the cyber space and the real space. As the border between the cyber space and the real space is being collapsed, the space of newly self-realization is being created. The collapse of gender is being shown as the pursuit of gender, which is a nomadic concept of not giving priority to anywhere of male gender and female gender. The tendency of sensitive design introduced the sports look as the largely fashion trend. Fascinated with Zen thoughts is leading to a response to the swiftly and coldly social conditions caused by machine. The digital culture by digital technology and the fashion tendency being shown by its influence, meet the needs of self-realization and self-expansion for a human being, and satisfy the needs for the expression of self-identity for a human being, and enable the search for introspection about inner existence inside the self.

Accuracy Evaluation of CyberKnife $Synchrony^{TM}$ Respiratory Tracking System Using Phantom (Phantom을 이용한 사이버나이프 $Synchrony^{TM}$ 호흡 추적장치의 정확성 평가)

  • Kim, Gha-Jung;Bae, Seok-Hwan;Lim, Chang-Seon;Kim, Chong-Yeal
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.137-143
    • /
    • 2009
  • This study was conducted to evaluate the accuracy of CyberKnife $Synchrony^{TM}$ respiratory tracking system which was applied to Stereotactic Radiosurgery (SRS) for moving tumors in chest and abdomen with breathing motion. For accurate evaluation, gold fiducial marks were implanted into a moving phantom. The moving phantom was a cube imbedding an acryl ball as a target. The acryl ball was prescribed to 20 Gy at 70% of isodose curve in a virtual treatment and radiochromic films were inserted into the acryl ball for dose verification and tracking accuracy evaluation. The evaluation of position tracking consists of two parts: fiducial mark tracking in a stationary phantom and $Synchrony^{TM}$ respiratory tracking in a moving phantom. Each measurement was done in three directions and was repeated to 5 times. Range of position error was 0.1957 mm to 0.6520 mm in the stationary phantom and 0.4405 mm to 0.7665 mm in the moving phantom. Average position error was 0.3926 mm and 0.5673 mm in the stationary phantom and the moving phantom respectively. This study evaluates the accuracy of CyberKnife $Synchrony^{TM}$ Respiratory tracking system, and confirms the usefulness when it's used for Stereotactic Radiosurgery of body organs.

A Study on Efficient Encryption for Message Communication between Devices (기기 간 메시지 부분 암호화 연구)

  • Lee, Yang-Ho;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • The advent of smart phones brought adverse effect between devices recently. For example, adverse effects of info-communication with advent of computer. Also, hacking threat aiming cyber space that is getting more advanced is spreading in terms of range and danger, so that it reaches the level that the nation has to concern. In this circumstance, crimes involving info-technology is now problem in society. As internet technology advances, it enlarges the range of hacker's threat to not only smart phones, but ships, aircrafts, buildings, and cars. It could be seen as social threat of between human and human, between machine and machine, and between human and machine. This study discuss these problems.

A Study on the Emergency Response System for Internet game event with simulation circumstance (시뮬레이션 환경하에서 인터넷 게임 사고 대응시스템모델 연구)

  • Shin, Seung-Jung;Choi, Woon-Ho
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.41-44
    • /
    • 2005
  • This paper is model can be useful and capable of automatically collecting and classifying the various information about a wide range of security incidents such as hackings, worms, spyware, cyber-terror, network espionage and information warfare from firewall, IDS, VPN and so on. According to them Internet game and an automated/integrated computer emergency response system can perform an attack assessment and an early warning for any incidents based on Enterprise Security Management environment.

  • PDF

Stereotactic body radiotherapy for solitary spine metastasis

  • Lee, Sunyoung;Chun, Mison;Lee, MiJo
    • Radiation Oncology Journal
    • /
    • v.31 no.4
    • /
    • pp.260-266
    • /
    • 2013
  • A clear consensus has not been established regarding the best treatment for solitary bone metastasis. Here, we reviewed the medical records of patients with a controlled primary malignancy who had only solitary spine metastasis without metastasis to the extraspinal bone or viscera and underwent treatment between April 2007 and December 2012 with stereotactic body radiosurgery using CyberKnife, with a total dose of 24 Gy in three to four fractions. During that time, there were only four cases. This was effective in each case, and all the four patients had no local failure and remained alive at a median follow-up of 68 months (range, 64 to 80 months). Although our experience is limited, this study suggests that stereotactic body radiotherapy could be a feasible, safe, effective, and noninvasive alternative treatment for solitary spine metastasis in patients who are medically inoperable or unsuitable for surgery.

AUTOMATIC TEXTURE EXTRACTION FROM AERIAL PHOTOGRAPHS USING THE ZI-BUFFER

  • Han, Dong-Yeob;Kim, Yong-Il;Yu, Ki-Yun;Lee, Hyo-Seong;Park, Byoung-Uk
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.584-586
    • /
    • 2007
  • 3D virtual modeling such as creation of a cyber city or landscape, or making a 3D GIS requires realistic textures. Automatic texture extraction using close range images is not yet efficient or easy in terms of data acquisition and processing. In this paper, common problems associated with automatic texture extraction from aerial photographs are explored. The ZI-buffer, which has depth and facet ID fields, is proposed to remove hidden pixels. The ZI-buffer algorithm reduces memory burden and identifies visible facets. The correct spatial resolution for facet gridding is tested. Error pixels in the visibility map were removed by filtering.

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.

Merits and Demerits of Information Security Education Using SaaS Based Virtual Training Systems (SaaS 기반 가상훈련 시스템을 이용한 정보보호 교육의 장단점)

  • Lee, Hae Young;Park, Hyun Min;Min, GyeongTae;Park, Young Sun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.211-212
    • /
    • 2019
  • 서로 다른 지역에서 서로 다른 과정의 실습 중심의 정보보호 단기 교육을 진행하기 위하여 SaaS 기반 가상훈련 시스템을 사용하였다. 본 논문에서는 SaaS 기반 가상훈련 시스템을 이용한 정보보호 실습 교육의 장단점을 정리한다. 강사 및 수강생들은 교육 과정 중 데스크톱 가상화를 사용하여 실습 환경을 구축하는 시간을 절약할 수 있었다. 또한, 원격 실습 지원, 진행 상황 확인도 가능하였다. 관리자는 강사 및 장소와 무관하게 균등한 실습 교육을 제공할 수 있다는 점이 가장 큰 장점이었다. 향후에는 서버 가상화와 데스크톱 가상화가 결합된 하이브리드 형태의 실습 환경 개발을 고려할 필요가 있다.

  • PDF

Trends in Digital Trade Policies and Trade Rules in Major Overseas Countries (해외 주요국의 디지털 통상 정책 및 무역 협정 규범 동향)

  • Kim, J.E.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.1-10
    • /
    • 2022
  • Digital trade rules are crucial in supporting the digital economy as the rules effectively reduce unnecessary trade barriers. This study introduces various approaches that major countries take regarding digital trade policies and rules. Comprehensive and Progressive Agreement for Trans-Pacific Partnership has introduced comprehensive rules on e-commerce, including binding articles on the free flow of information, location of computing facilities, and source code. More recent e-commerce provisions or digital trade agreements cover wider range of issues, from cyber security, artificial intelligence, and data innovation to electronic invoicing and payments. Multilateral negotiations on digital trade rules, including the World Trade Organization E-commerce Joint Statement Initiatives and Indo-Pacific Economic Framework, are in progress. Thus, countries involved are expected to respond to new digital trade issues with long-term strategies considering domestic policy objectives.