• Title/Summary/Keyword: Data corruption

Search Result 107, Processing Time 0.025 seconds

Analysis of Noise Sensitivity due to Image Wireless Transmission (링크암호 환경에서 이미지 데이터와 잡음의 영향)

  • Kim, KiHwan;Kim, HyeongRag;Lee, HoonJae;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.211-220
    • /
    • 2018
  • The standard data link layer encryption provided by CCSDS has a structure that encodes HDLC frame into it using an AES algorithm. However, CCSDS is standard method has a structure in which the receiving side cannot request a re-activation when noise interference occurs over an unstable channel. SES Alarmed has a structure that enables the receiving side to additionally detect errors and perform re-activation requests in an operational structure similar to that of link encryption in CCSDS. The SES Alarmed related paper was intended to identify the optimum range of thresholds and identify data corruption due to channel noise. In this paper, the focus was on reducing the re-activation process if the HDLC frame, excluding the password Sync code, consistently exceeds any threshold levels. The HDLC frame order was changed and the results of using SES Alarmed were proposed and compared.

A Design of Temperature Management System for Preventing High Temperature Failures on Mobility Dedicated Storage (모빌리티 전용 저장장치의 고온 고장 방지를 위한 온도 관리 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.125-130
    • /
    • 2024
  • With the rapid growth of mobility technology, the industrial sector is demanding storage devices that can reliably process data from various equipment and sensors in vehicles. NAND flash memory is being utilized as a storage device in mobility environments because it has the advantages of low power and fast data processing speed as well as strong external shock resistance. However, flash memory is characterized by data corruption due to long-term exposure to high temperatures. Therefore, a dedicated system for temperature management is required in mobility environments where high temperature exposure due to weather or external heat sources such as solar radiation is frequent. This paper designs a dedicated temperature management system for managing storage device temperature in a mobility environment. The designed temperature management system is a hybrid of traditional air cooling and water cooling technologies. The cooling method is designed to operate adaptively according to the temperature of the storage device, and it is designed not to operate when the temperature step is low to improve energy efficiency. Finally, experiments were conducted to analyze the temperature difference between each cooling method and different heat dissipation materials, proving that the temperature management policy is effective in maintaining performance.

Estimation of Motion-Blur Parameters Based on a Stochastic Peak Trace Algorithm (통계적 극점 자취 알고리즘에 기초한 움직임 열화 영상의 파라메터 추출)

  • 최병철;홍훈섭;강문기
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.281-289
    • /
    • 2000
  • While acquiring images, the relative motion between the imaging device and the object scene seriously damages the image quality. This phenomenon is called motion blur. The peak-trace approach, which is our recent previous work, identifies important parameters to characterize the point spread function (PSF) of the blur, given only the blurred image itself. With the peak-trace approach the direction of the motion blur can be extracted regardless of the noise corruption and does not need much Processing time. In this paper stochastic peak-trace approaches are introduced. The erroneous data can be selected through the ML classification, and can be made small through weighting. Therefore the distortion of the direction in the low frequency region can be prevented. Using the linear prediction method, the irregular data are prohibited from being selected as the peak point. The detection of the second peak using the proposed moving average least mean (MALM) method is used in the Identification of the motion extent. The MALM method itself includes a noise removal process, so it is possible to extract the parameters even an environment of heavy noise. In the experiment, we could efficiently restore the degraded image using the information obtained by the proposed algorithm.

  • PDF

Information Systems in Project Management of The Public Sphere

  • Mamatova, Tetiana;Chykarenko, Iryna;Chykarenko, Oleksii;Kravtsova, Тetiana;Kravtsov, Olеg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.141-148
    • /
    • 2021
  • Project management is a current trend of management in the public sphere, based on different principles, methods and tools. The tools include information technologies providing control over time, cost, quality and planning process in order to ensure accountability to interested parties. The goal of the research was to examine the impact of the integration of information systems in project management of the public sphere on the quality of public governance and administration using the example of infrastructure projects involving the private sector in developing countries. The methodology of the research is based on the concepts of "digital-era governance" (DEG), "Information governance" and "project governance" to determine the effectiveness of information systems and technologies in the management of infrastructure projects in the public sphere. The data from the countries with Lower middle income (India, Indonesia, Philippines, Ukraine, Vietnam) and Upper middle income (Argentina, Brazil, China, Colombia, Mexico, Peru, Romania, Russian Federation, Thailand, Turkey) for 1996-2020 were used to study the effects of DEG. The results show two main trends in the countries with Lower middle income and Upper middle income. The first trend is the development of digital governance, the concept of "digital-era governance" through information systems and performance measurement of the governance system, forecasting of investment flows of infrastructure projects, measurement of payback and effectiveness parameters for investment management in the public sector, decision support. The second trend is the existence of systemic challenges related to corruption, social and institutional factors through the development of democracy in developing countries and the integration of NPM similar to developed countries. The confidence of interested parties, especially private investors, in public authorities is determined by other factors - the level of return on investment, risks and assignment of responsibility, probability of successful completion of the project. These data still remain limited for a wide range of project participants, including citizens.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Explanable Artificial Intelligence Study based on Blockchain Using Point Cloud (포인트 클라우드를 이용한 블록체인 기반 설명 가능한 인공지능 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.36-41
    • /
    • 2021
  • Although the technology for prediction or analysis using artificial intelligence is constantly developing, a black-box problem does not interpret the decision-making process. Therefore, the decision process of the AI model can not be interpreted from the user's point of view, which leads to unreliable results. We investigated the problems of artificial intelligence and explainable artificial intelligence using Blockchain to solve them. Data from the decision-making process of artificial intelligence models, which can be explained with Blockchain, are stored in Blockchain with time stamps, among other things. Blockchain provides anti-counterfeiting of the stored data, and due to the nature of Blockchain, it allows free access to data such as decision processes stored in blocks. The difficulty of creating explainable artificial intelligence models is a large part of the complexity of existing models. Therefore, using the point cloud to increase the efficiency of 3D data processing and the processing procedures will shorten the decision-making process to facilitate an explainable artificial intelligence model. To solve the oracle problem, which may lead to data falsification or corruption when storing data in the Blockchain, a blockchain artificial intelligence problem was solved by proposing a blockchain-based explainable artificial intelligence model that passes through an intermediary in the storage process.

Performance Analysis of RS codes for Low Power Wireless Sensor Networks (저전력 무선 센서 네트워크를 위한 RS 코드의 성능 분석)

  • Jung, Kyung-Kwon;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2010
  • In wireless sensor networks, the data transmitted from the sensor nodes are susceptible to corruption by errors which caused of noisy channels and other factors. In view of the severe energy constraint in Sensor Networks, it is important to use the error control scheme of the energy efficiently. In this paper, we presented RS (Reed-Solomon) codes in terms of their BER performance and power consumption. RS codes work by adding extra redundancy to the data. The encoded data can be stored or transmitted. It could have errors introduced, when the encoded data is recovered. The added redundancy allows a decoder to detect which parts of the received data is corrupted, and corrects them. The number of errors which are able to be corrected by RS code can determine by added redundancy. The results of experiment validate the performance of proposed method to provide high degree of reliability in low-power communication. We could predict the lifetime of RS codes which transmitted at 32 byte a 1 minutes. RS(15, 13), RS(31, 27), RS(63, 57), RS(127,115), and RS(255,239) can keep the days of 173.7, 169.1, 163.9, 150.7, and 149.7 respectively. The evaluation based on packet reception ratio (PRR) indicates that the RS(255,239) extends a sensor node's communication range by up about 3 miters.

A Study of CHAMP Satellite Magnetic Anomalies in East Asia (동아시아지역에서의 CHAMP 위성자료에서의 지각 자기이상의 연구)

  • Kim, Hyung Rae
    • Economic and Environmental Geology
    • /
    • v.54 no.1
    • /
    • pp.117-126
    • /
    • 2021
  • Satellite magnetic observations reflect the magnetic properties of deep crust about the depth of Curie isotherm that is a boundary where the magnetic nature of the rocks is disappeared, showing long wavelength anomalies that are not easily detected in near-surface data from airborne and shipborne surveys. For this reason, they are important not only in the analyses on such as plate reconstruction of tectonic boundaries and deep crustal structures, but in the studies of geothermal distribution in Antarctic and Greenland crust, related to global warming issue. It is a conventional method to compute the spherical harmonic coefficients from global coverage of satellite magnetic observations but it should be noted that inclusion of erroneous data from the equator and the poles where magnetic observations are highly disturbed might mislead the global model of the coefficients. Otherwise, the reduced anomaly model can be obtained with less corruption by choosing the area of interest with proper data processing to the area. In this study, I produced a satellite crustal magnetic anomaly map over East Asia (20° ~ 55°N, 108° ~ 150°E) centered on Korean Peninsula, from CHAMP satellite magnetic measurements about mean altitude of 280 km during the last year of the mission, and compared with the one from global crustal magnetic model (MF7). Also, a comparison was made with long wavelength anomalies from EMAG2 model compiled from all near-surface data over the globe.

Blockchain Evaluation Indexes and Methods to Vitalize a Blockchain-based Digital Sharing Economy (블록체인 기반 디지털 공유경제 활성화를 위한 블록체인 평가지표 및 평가방법에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.193-200
    • /
    • 2018
  • Recently, there are high expectations of a society benefitting from a digital sharing economy. However, to establish a digital sharing economy, one needs to first create a reliable social structure. Transparency is recognized as the most important measure of value in not just politics or economics, but also in all domains of our lives. Although all nations strive to create "societies based on credit and trust," in truth, rigidity, irregularity, corruption, and inefficiency are widespread in all aspects of society. Thus, there is a growing interest in blockchain technology, also called the "second Internet revolution," seeking trust in digital environments, although it is difficult to obtain trust in such environments. However, the principles and methods of evaluating blockchain technologies are still unclear and not standardized. This study addresses the evaluation indexes such as transaction per second, maximum data size per one transaction, accuracy and blockchain technology application methods in the digital sharing economy and suggest ways to safely vitalize a blockchain-based digital sharing economy.

An Iterative Weighted Mean Filter for Mixed Noise Reduction (복합 잡음 저감을 위한 반복 가중 평균 필터)

  • Lee, Jung-Moon
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.175-182
    • /
    • 2017
  • Noises are usually generated by various external causes and low quality devices in image data acquisition and recording as well as by channel interference in image transmission. Since these noise signals result in the loss of information, subsequent image processing is subject to the corruption of the original image. In general, image processing is performed in the mixed noise environment where common types of noise, known to be Gaussian and impulse, are present. This study proposes an iterative weighted mean filter for reducing mixed type of noise. Impulse noise pixels are first turned off in the input image, then $3{\times}3$ sliding window regions are processed by replacing center pixel with the result of weighted mean mask operation. This filtering processes are iterated until all the impulse noise pixels are replaced. Applied to images corrupted by Gaussian noise with ${\sigma}=10$ and different levels of impulse noise, the proposed filtering method improved the PSNR by up to 12.98 dB, 1.97 dB, 1.97 dB respectively, compared to SAWF, AWMF, MMF when impulse noise desities are less than 60%.