• Title/Summary/Keyword: Kernel protection

Search Result 57, Processing Time 0.023 seconds

A Study on Properties of Crude Oil Based Derivative Linked Security (유가 연계 파생결합증권의 특성에 대한 연구)

  • Sohn, Kyoung-Woo;Chung, Ji-Yeong
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.3
    • /
    • pp.243-260
    • /
    • 2020
  • Purpose - This paper aims to investigate the properties of crude oil based derivative security (DLS) focusing on step-down type for comprehensive understanding of its risk. Design/methodology/approach - Kernel estimation is conducted to figure out statistical feature of the process of oil price. We simulate oil price paths based on kernel estimation results and derive probabilities of hitting the barrier and early redemption. Findings - The amount of issuance for crude oil based DLS is relatively low when base prices are below $40 while it is high when base prices are around $60 or $100, which is not consistent with kernel estimation results showing that oil futures prices tend to revert toward $46.14 and the mean-reverting speed is faster as oil price is lower. The analysis based on simulated oil price paths reveals that probability of early redemption is below 50% for DLS with high base prices and the ratio of the probability of early redemption to the probability of hitting barrier is remarkably low compared to the case for DLS with low base prices, as the chance of early redemption is deferred. Research implications or Originality - Empirical results imply that the level of the base price is a crucial factor of the risk for DLS, thus introducing a time-varying knock-in barrier, which is similar to adjust the base price, merits consideration to enhance protection for DLS investors.

Home Range Size and Habitat Environment Related to the Parturition of Roe Deer at Warm-Temperate Forest in Jeju Island Using GPS-CDMA Based Wildlife Tracking System (GPS와 CDMA를 이용한 난대림의 출산 전후 암노루 행동권 및 서식환경 조사)

  • Kim, Eun-Mi;Kwon, Jin-O;Kang, Chang-Wan;Song, Kuk-Man;Min, Dong-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.2
    • /
    • pp.65-74
    • /
    • 2013
  • A research program for the roe deer (Capreolus pygargus) has been set up at the Jeju Experimental Forest of Warm-temperate and Subtropical Forest Research Center in Jeju Island. To explore the home range size and habitat environment, 3 males and 3 females have been captured and released with GPS-CDMA based telemetry since 24th April 2012. Among them 2 females were captured at Hannam Forest of Seoguipo, were pregnant and monitored by the tracking system. There are significantly different patterns in behavior around the parturition. After parturition they show recurrence behavior toward one point in the forest, while they have irregular patterns in moving before. To calculate the home range size, the MCP (minimum convex polygon) and Kernel Method are applied through the extension of ESRI ArcView GIS 3.2a. The pregnant female captured 9th May 2012 has the size of MCP=67ha and Kernel 95%=0.5ha and the pregnant female captured 12th July 2012 has the size of MCP=82ha and Kernel 95%=0.9ha. Although a fawn could move immediately just after the birth likely others to avoid any risks, they stay at very narrow space significantly, and the size become wider when more time goes by. Furthermore, they mainly have a home range away from human activity area such as forest tracking roads. The habitat environment for the parturition is summarized as 40years old cryptomeria forests with new sprouting shrubs for foods, which are the controlled forest through the thinning and removing shrubs 2 years ago. This means that forest works could cause positive results for the parturition and survival of young. The period of parturition is earlier than highland in Jeju Island, the size of home range is narrower than other countries, and the habitat environment of the shelter for a fawn is similar to previous research in other countries.

A Study on the Mapping of Fishing Activity using V-Pass Data - Focusing on the Southeast Sea of Korea - (선박패스(V-Pass) 자료를 활용한 어업활동 지도 제작 연구 - 남해동부해역을 중심으로 -)

  • HAN, Jae-Rim;KIM, Tae-Hoon;CHOI, Eun Yeong;CHOI, Hyun-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.1
    • /
    • pp.112-125
    • /
    • 2021
  • Marine spatial planning(MSP) designates the marine as nine kinds of use zones for the systematic and rational management of marine spaces. One of them is the fishery protection zone, which is necessary for the sustainable production of fishery products, including the protection and fosterage of fishing activities. This study intends to quantitatively identify the fishing activity space, one of the elements necessary for the designation of fisheries protection zones, by mapping of fishery activities using V-Pass data and deriving the fishery activity concentrated zone. To this end, pre-processing of V-Pass data was performed, such as constructing a dataset that combines static and dynamic information, calculating the speed of fishing vessels, extracting fishing activity points, and removing data in non-fishing activity zone. Finally, using the selected V-Pass point data, a fishery activity map was made by kernel density estimation, and the concentrated space of fishery activity was analyzed. In addition, it was confirmed that there is a difference in the spatial distribution of fishing activities according to the type of fishing vessel and the season. The pre-processing technique of large volume V-Pass data and the mapping method of fishing activities performed through this study are expected to contribute to the study of spatial characteristics evaluation of fishing activities in the future.

A Study on Data Acquisition and Analysis Methods for Mac Memory Forensics (macOS 메모리 포렌식을 위한 데이터 수집 및 분석 방법에 대한 연구)

  • Jung Woo Lee;Dohyun Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.179-192
    • /
    • 2024
  • macOS presents challenges for memory data acquisition due to its proprietary system architecture, closed-source kernel, and security features such as System Integrity Protection (SIP), which are exclusive to Apple's product line. Consequently, conventional memory acquisition tools are often ineffective or require system rebooting. This paper analyzes the status and limitations of existing memory forensics research and tools related to macOS. We investigate methods for memory acquisition and analysis across various macOS versions. Our findings include the development of a practical memory acquisition and analysis process for digital forensic investigations utilizing OSXPmem and dd tools for memory acquisition without system rebooting, and Volatility 2, 3 for memory data analysis.

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF

Carbon Containing Compositions

  • Mansurova, R.M.;Mansurov, Z.A.
    • Transactions on Electrical and Electronic Materials
    • /
    • v.2 no.2
    • /
    • pp.5-15
    • /
    • 2001
  • The experiment established optimal conditions for over-carbonization. With the use of the electron microscopy and X-ray phase analysis the regularities of carbon deposit formation in process of methane and propane pyrolysis on the zeolites, Kazakhstan natural clays, chrome and bauxite sludge containing metal oxides of iron subgroup, have been studied. In process of over-carbonization the trivalent iron was reduced to metal form. In addition, the carbon tubes of divers morphology had been impregnated with ultra-dispersed metal particles. The kinetic parameters of carbon formation in process of methane decomposition on the zeolite - CoO mixture surface were investigated by method of thermo-gravimetric analysis. The morphology and structure of formed carbon fibrils, with the metal particles fixed at their ends, have been investigated, the formation of branched carbon fibrils pattern, so called octopus, being found. Also, the walnut shells and grape kernel carbonization, their immobilization by the cells of selective absorption of heavy metal and sulfur dioxide ions have been studied. The example of metal-carbon composites used as adsorbents for wastewater purification, C$_3$- C$_4$ hydrocarbon cracking catalysts and refractory materials with improved properties have been considered.

  • PDF

Implementation and Interoperability Test for the IEEE 802.1Qay PBB-TE System (IEEE 802.1Qay PBB-TE 표준 시스템 구현과 상호 운용성 검증)

  • Kim, Hyun-Pil;Moon, Sang-Won;Choi, Jin-Seek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1636-1646
    • /
    • 2011
  • In this paper, we implement IEEE 802.1Qay PBB-TE system and verify interoperability with the commercial PBB-TE product. In order to verify interoperability, we implement the standard protocol as well as the system integrating functions including system kernel control functions. Through interoperability tests with the commercial system, we verify the implemented protocol to perform PBB-TE TESI and ESP configurations, and protection switching as well as monitoring the results.

Active Video Watermarking Technique for Infectious Information Hiding System (전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1017-1030
    • /
    • 2012
  • Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.

VALIDATION OF ON-LINE MONITORING TECHNIQUES TO NUCLEAR PLANT DATA

  • Garvey, Jamie;Garvey, Dustin;Seibert, Rebecca;Hines, J. Wesley
    • Nuclear Engineering and Technology
    • /
    • v.39 no.2
    • /
    • pp.133-142
    • /
    • 2007
  • The Electric Power Research Institute (EPRI) demonstrated a method for monitoring the performance of instrument channels in Topical Report (TR) 104965, 'On-Line Monitoring of Instrument Channel Performance.' This paper presents the results of several models originally developed by EPRI to monitor three nuclear plant sensor sets: Pressurizer Level, Reactor Protection System (RPS) Loop A, and Reactor Coolant System (RCS) Loop A Steam Generator (SG) Level. The sensor sets investigated include one redundant sensor model and two non-redundant sensor models. Each model employs an Auto-Associative Kernel Regression (AAKR) model architecture to predict correct sensor behavior. Performance of each of the developed models is evaluated using four metrics: accuracy, auto-sensitivity, cross-sensitivity, and newly developed Error Uncertainty Limit Monitoring (EULM) detectability. The uncertainty estimate for each model is also calculated through two methods: analytic formulas and Monte Carlo estimation. The uncertainty estimates are verified by calculating confidence interval coverages to assure that 95% of the measured data fall within the confidence intervals. The model performance evaluation identified the Pressurizer Level model as acceptable for on-line monitoring (OLM) implementation. The other two models, RPS Loop A and RCS Loop A SG Level, highlight two common problems that occur in model development and evaluation, namely faulty data and poor signal selection

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.