• Title/Summary/Keyword: ICS

Search Result 537, Processing Time 0.024 seconds

Feedback Cancellation Based on Partitioned Time-Domain Pilots for T-DMB Repeaters (시간영역 파일럿 분할을 통한 T-DMB 중계기에서의 궤환신호 제거기법)

  • Lee, Ji-Bong;Kim, Wan-Jin;Park, Sung-Ik;Lee, Yong-Tae;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3A
    • /
    • pp.327-334
    • /
    • 2008
  • Conventional on-channel-repeaters (OCRs) have a crucial problem that the power of a re-transmitted signal is highly limited by a feedback signal due to antenna coupling. The power limitation problem in OCRs has been solved by incorporating a demodulation-type feedback canceller which eliminates unwanted feedback signals by estimating a feedback channel. In applying the demodulation-type feedback canceller to T-DMB repeaters, there is a troublesome problem of unfrequent known pilot symbols, resulting in poor convergence performance of channel estimation. To solve this problem and enhance the accuracy of estimation, we propose a partitioning method of the Phase Reference Symbol (PRS) transformed in time domain. Since filter coefficients are updated every one partitioned subgroup, the number of updates is increased by the number of partitioned subgroups and thus the convergence speed is enhanced. The improved performance of feedback-channel estimation is directly connected with the feedback-cancellation performance. Simulation result shows that the feedback canceller incorporating the proposed partitioning method has a good performance in terms of residual feedback power.

Control of Methyl Tertiary-Butyl Ether via Carbon-Doped Photocatalysts under Visible-Light Irradiation

  • Lee, Joon-Yeob;Jo, Wan-Kuen
    • Environmental Engineering Research
    • /
    • v.17 no.4
    • /
    • pp.179-184
    • /
    • 2012
  • The light absorbance of photocatalysts and reaction kinetics of environmental pollutants at the liquid-solid and gas-solid interfaces differ from each other. Nevertheless, many previous photocatalytic studies have applied the science to aqueopus applications without due consideration of the environment. As such, this work reports the surface and morphological characteristics and photocatalytic activities of carbon-embedded (C-$TiO_2$) photocatalysts for control of gas-phase methyl tertiary-butyl ether (MTBE) under a range of different operational conditions. The C-$TiO_2$ photocatalysts were prepared by oxidizing titanium carbide powders at $350^{\circ}C$. The characteristics of the C-$TiO_2$ photocatalysts, along with pure TiC and the reference pure $TiO_2$, were then determined by X-ray diffraction, scanning emission microscope, diffuse reflectance ultraviolet-visible-near infrared (UV-VIS-NIR), and Fourier transform infrared spectroscopy. The C-$TiO_2$ powders showed a clear shift in the absorbance spectrum towards the visible region, which indicated that the C-$TiO_2$ photocatalyst could be activated effectively by visible-light irradiation. The MTBE decomposition efficiency depended on operational parameters, including the air flow rate (AFR), input concentration (IC), and relative humidity (RH). As the AFRs decreased from 1.5 to 0.1 L/min, the average efficiencies for MTBE increased from 11% to 77%. The average decomposition efficiencies for the ICs of 0.1, 0.5, 1.0, and 2.0 ppm were 77%, 77%, 54%, and 38%, respectively. In addition, the decomposition efficiencies for RHs of 20%, 45%, 70%, and 95% were 92%, 76%, 50%, and 32%, respectively. These findings indicate that the prepared photocatalysts could be effectively applied to control airborne MTBE if their operational conditions were optimized.

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.

A Study on the Influence of the Organic Matter Contents in Soil Deposited of Chlorine Gas (염소의 토양 침적특성에 미치는 토양 내 유기물 함량의 영향)

  • Song, Bo Hee;Lee, Kyung Eun;Yim, Sang Sik;Lee, Jin Han;Jo, Young Do
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.1
    • /
    • pp.1-5
    • /
    • 2017
  • In the event of toxic gas accidents, soil deposition is a main factor which has an effect on extent of the damage. In this study, it presents the influence of soil deposition properties according to the change of soil depth and the organic matter contents in soil. In this experimentation, the soil deposition device developed in Air Force Research Laboratory in USA is recreated. The tested samples of mixing soil have each value of the organic matter contents. After a variety of synthetic soil were exposed to constant Cl2 concentration, the chlorinity is measured using an anion exchange chromatography(ICS-1100) to quantify the mount of deposition. As the results, the increase of soil depth causes an decreased soil deposition and the increase of exposure time causes an increased soil deposition in surface. Also, the increase of soil deposition mainly depended on the organic matter contents in surface.

A Study on Malfunction Mode of CMOS IC Under Narrow-Band High-Power Electromagnetic Wave (협대역 고출력 전자기파로 인한 CMOS IC에서의 오동작 특성 연구)

  • Park, Jin-Wook;Huh, Chang-Su;Seo, Chang-Su;Lee, Sung-Woo
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.29 no.9
    • /
    • pp.559-564
    • /
    • 2016
  • This study examined the malfunction mode of the HCMOS IC under narrow-band high-power electromagnetic wave. Magnetron is used to a narrow-band electromagnetic source. MFR (malfunction failure rate) was measured to investigate the HCMOS IC. In addition, we measured the resistance between specific pins of ICs, which are exposed and not exposed to the electromagnetic wave, respectively. As a test result of measurement, malfunction mode is shown in three steps. Flicker mode causing a flicker in LED connected to output pin of IC is dominant in more than 7.96 kV/m electric field. Self-reset mode causing a voltage drop to the input and output of IC during electromagnetic wave radiation is dominant in more than 9.1 kV/m electric field. Power-reset mode making a IC remained malfunction after electromagnetic radiation is dominant in more than 20.89 kV/m. As a measurement result of pin-to-pin resistance of IC, the differences between IC exposed to electromagnetic wave and normal IC were minor. However, the five in two hundred IC show a relatively low resistance. This is considered to be the result of the breakdown of pn junction when latch-up in CMOS occurred. Based on the results, the susceptibility of HCMOS IC can be applied to a basic database to IC protection and impact analysis of narrow-band high-power electromagnetic waves.

A User-Centric Response Time Analyzer for Improving User Experience of Android Applications (스마트폰 응용 프로그램의 사용자 경험 향상을 위한 사용자 중심 반응 시간 분석 도구)

  • Song, Wook;Sung, Nosub;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.5
    • /
    • pp.379-386
    • /
    • 2015
  • We propose a novel user-perceived performance optimization framework for the Android platform that takes advantage of the user-centric response time analysis. To this end, we propose a new definition of response time, which we call the user-centric response time, as a metric for the quality of user-perceived performance of the smartphone application. In this paper, we describe the design and implementation of an on-line user-centric response time analyzer for Android-based smartphones, which provides smartphone application developers with valuable insight for user-perceived performance optimization. We implemented the user-centric response time analyzer on the Android platform, version 4.0.4 (ICS) running on a Galaxy Nexus smartphone. From our experimental results, the proposed user-centric response time analyzer accurately estimates user-centric response times with an accuracy of 92.0% compared to manually measured times with less than 1% performance penalty. In order to evaluate the efficiency of the proposed framework, we were able to reduce the user-centric response time of the target application by up to 16.4% based on the evaluation results by the proposed framework.

The Study of Industrial Trends in Power Semiconductor Industry (전력용반도체 산업분석 및 시사점)

  • Chun, Hwang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.845-848
    • /
    • 2009
  • Power semiconductor devices are semiconductor devices used as switches or rectifiers in power electronics circuits. Theyare also caleed power devices or when used in integrated circuits, called power ICs. Some common power devices are the power diode, thyristor, power MOSFET and IGBT (insulated gate bipolar transistor). A power diode or MOSFET operates on similar principles to its low-power counterpart, but is able to carry a larger amount of current and typically is able to support a larger reverse-bias voltage in the off-state. Structural changes are often made in power devices to accommodate the higher current density, higher power dissipation and/or higher reverse breakdown voltage. The vast majority of the discrete (i.e non integrated) power devices are built using a vertical structure, whereas small-signal devices employ a lateral structure. With the vertical structure, the current rating of the device is proportional to its area, and the voltage blocking capability is achieved in the height of the die. With this structure, one of the connections of the device is located on the bottom of the semiconductor.

  • PDF

Access Control Mechanism for Industrial Control System Based Smart Contract (스마트 컨트랙트 기반의 산업제어시스템 접근 제어 메커니즘)

  • Cho, Minjeong;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.579-588
    • /
    • 2019
  • Industrial control systems consist of various physical devices such as sensors, actuators. Security Infringement such as waterworks facilities Remote Access Infringement and power control systems Infection have been occured by vulnerability of Access Control. Access control to physical devices must be fulfilled with a reliable system. However, Having a single access control system inside company can not guarantee reliability. In addition, when single access control is struggled with error or infringement, access control system is totally unavailable. so system requires a additional access control method or system. In this paper, we proposed access control mechanism for reliable and stable operation using blockchain and smart contract. Proposed Mechanism using trust score to consider resources to be consumed depending on each industrial environment in consideration of the industrial control system where availability is more important than integrity and confidentiality. Unlike other blockchain-based access control system, proposed system is designed for the currently operating industrial control system.

Abnormal Detection for Industrial Control Systems Using Ensemble Recurrent Neural Networks Model (산업제어시스템에서 앙상블 순환신경망 모델을 이용한 비정상 탐지)

  • Kim, HyoSeok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.401-410
    • /
    • 2021
  • Recently, as cyber attacks targeting industrial control systems increase, various studies are being conducted on the detection of abnormalities in industrial processes. Considering that the industrial process is deterministic and regular, It is appropriate to determine abnormality by comparing the predicted value of the detection model from which normal data is trained and the actual value. In this paper, HAI Datasets 20.07 and 21.03 are used. In addition, an ensemble model is created by combining models that have applied different time steps to Gated Recurrent Units. Then, the detection performance of the single model and the ensemble recurrent neural networks model were compared through various performance evaluation analysis, and It was confirmed that the proposed model is more suitable for abnormal detection in industrial control systems.