• Title/Summary/Keyword: Recovery Scheme

Search Result 479, Processing Time 0.028 seconds

ISO/IEC JTC1/SC27의 국제표준소개(4) : 정보기술- 보안기술-메세지 복원형 디지탈서명 방식 [Information technology - Security techniques - Digital signature scheme giving message recovery]

  • 이필중
    • Review of KIISC
    • /
    • v.4 no.2
    • /
    • pp.74-99
    • /
    • 1994
  • ISO와 IEC가JTC1 을 만들기 이전인 1984년 'Digital Signature'를 만들기위한 과제가 시작되었다, 그후 3개의 과제로 세분되고 그중 첫번째의 과제로 본 문서가 가장 먼저 국제표준이 되었다. 1989년에 제목이 지금과 같이 바뀌었고, 1990년 DIS를 거쳐 1991년에 IS가 되었다. 1996년에 재검토될 예정이다.

  • PDF

Image Watermarking using holographic watermark (홀로그래픽 watermark를 이용한 영상 watermarking)

  • 김규태;김수길;고명숙;김종원;최종욱
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.175-179
    • /
    • 2003
  • We propose a new watermarking scheme that can be used to embed multiple bits and also resilient to JPEG compression and geometrical transforms such as scaling, rotation, and cropping based on holographic watermark that allows multiple watermark recovery without original content(cover image).

  • PDF

Implementation of TCP Retransmitted Packet Loss Recovery using ns-2 Simulator (ns-2 시뮬레이터를 이용한 TCP 재전송 손실 복구 알고리듬의 구현)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.741-746
    • /
    • 2012
  • Transmission control protocol(TCP) widely used as a transport protocol in the Internet includes a loss recovery function that detects and recovers packet losses by retransmissions. The loss recovery function consists of the two algorithms; fast retransmit and fast recovery. There have been researches to avoid nonnecessary retransmission timeouts (RTOs), which leads to selective acknowledgement (SACK) option and limited transmit scheme that are standardized by IETF (Internet Engineering Task Force). Recently, a method that covers the case in which a retransmitted packet is lost again has been propsed. The method, however, is not proved in terms of the additive increase multiplicative decrease (AIMD) principle of TCP congestion control. In this paper, therefore, we analyzed the method in terms of the principle by ns-simulations.

Network Synchronization and NCR Recovery for ACM Mode for DVB-S2/RCS2 (DVB-S2/RCS-2 ACM 운용 환경에서의 네트워크 동기 및 NCR 복원)

  • Jeon, Hanik;Oh, Deock-Gil
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.102-108
    • /
    • 2015
  • In general, two way satellite communication systems based on TDMA(Time Division Multiple Access) require network clock synchronization between hub station and remote terminals. This paper describes basic concepts for network clock synchronization based on NCR(Network Clock Reference) clock recovery scheme as suggested in DVB-S2/ RCS2 international standards. in addition, a new NCR insertion method has been proposed and evaluated in terms of supporting CCM mode as well as ACM mode which optimizes throughput by changing code rates and modulation types ranging from QPSK to 32-APSK.

High Efficiency Alternating Current Driver for Capacitive Loads Using a Current-Balance Transformer

  • Baek, Jong-Bok;Cho, Bo-Hyung;Park, Joung-Hu
    • Journal of Power Electronics
    • /
    • v.11 no.1
    • /
    • pp.97-104
    • /
    • 2011
  • This paper proposes a new alternating current driving method for highly capacitive loads such as plasma display panels or piezoelectric actuators, etc. In the proposed scheme, a current balance transformer, which has two windings with the same turn-ratio, provides not only a resonance inductance for energy recovery but also a current balance among all of the switching devices of the driver for current stress reduction. The smaller conduction loss than conventional circuits occurs due to the dual conduction paths which are parallel each other in the current balance transformer. Also, the leakage inductances of the transformer are utilized as resonant inductors for energy recovery by the series resonance to the capacitive load. Furthermore, the resonance contributes to the small switching losses of the switching devices by soft-switching operation. To confirm the validity of the proposed circuit, prototype hardware with a 12-inch mercury-free flat fluorescent lamp is implemented. The experimental results are compared with a conventional energy-recovery circuit from the perspective of luminance performances.

Maneuvering Target Tracking Using Error Monitoring

  • Fang, Tae-Hyun;Park, Jae-Weon;Hong, Keum-Shik
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.329-334
    • /
    • 1998
  • This work is concerned with the problem of tracking a maneuvering target. In this paper, an error monitoring and recovery method of perception net is utilized to improve tracking performance for a highly maneuvering tar-get. Many researches have been performed in tracking a maneuvering target. The conventional Interacting Multiple Model (IMM) filter is well known as a suboptimal hybrid filter that has been shown to be one of the most cost-effective hybrid state estimation scheme. The subfilters of IMM can be considered as fusing its initial value with new measurements. This approach is also shown in this paper. Perception net based error monitoring and recovery technique, which is a kind of geometric data fusion, makes it possible to monitor errors and to calibrate possible biases involved in sensed data and extracted features. Both detecting a maneuvering target and compensating the estimated state can be achieved by employing the properly implemented error monitoring and recovery technique. The IMM filter which employing the error monitoring and recovery technique shows good tracking performance for a highly maneuvering target as well as it reduces maximum values of estimation errors when maneuvering starts and finishes. The effectiveness of the pro-posed method is validated through simulation by comparing it with the conventional IMM algorithm.

  • PDF

Implementation of Under Voltage Load Shedding for Fault Induced Delayed Voltage Recovery Phenomenon Alleviation

  • Lee, Yun-Hwan;Park, Bo-Hyun;Oh, Seung-Chan;Lee, Byong-Jun;Shin, Jeong-Hoon;Kim, Tae-Kyun
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.406-414
    • /
    • 2014
  • Significant penetration of induction motor loads into residential neighborhood and commercial regions of local transmission systems at least partially determine a vulnerability to a fault induced delayed voltage recovery (FIDVR) event. Highly concentrated induction motor loads with constant torque could stall in response to low voltages associated with system faults. FIDVR is caused by wide spread stalling of small HVAC units (residential air conditioner) during transmission level faults. An under voltage load shedding scheme (UVLS) can be an effective component in a strategy to manage FIDVR risk and limit the any potential disturbance. Under Voltage Load Shedding take advantage of the plan to recovery the voltage of the system by shedding the load ways to alleviation FIDVR.

Adaptive finite element wind analysis with mesh refinement and recovery

  • Choi, Chang-Koon;Yu, Won-Jin
    • Wind and Structures
    • /
    • v.1 no.1
    • /
    • pp.111-125
    • /
    • 1998
  • This paper deals with the development of variable-node element and its application to the adaptive h-version mesh refinement-recovery for the incompressible viscous flow analysis. The element which has variable mid-side nodes can be used in generating the transition zone between the refined and unrefined element and efficiently used for the construction of a refined mesh without generating distorted elements. A modified Guassian quadrature is needed to evaluate the element matrices due to the discontinuity of derivatives of the shape functions used for the element. The penalty function method which can reduce the number of the independent variables is adopted for the purpose of computational efficiency and the selective reduced integration is carried out for the convection and pressure terms to preserve the stability of solution. For the economical analysis of transient problems in which the locations to be refined are changed in accordance with the dynamic distribution of velocity gradient, not only the mesh refinement but also the mesh recovery is needed. The numerical examples show that the optimal mesh for the finite element analysis of a wind around the structures can be obtained automatically by the proposed scheme.

Recoverable Password Based Key Exchange Protocol (복구 가능한 패스워드 기반 키 분배 프로토콜)

  • 손기욱;최영철;박상준;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.97-104
    • /
    • 2001
  • In this paper, we propose Recoverable Password Based Key Exchange Protocol(RPKEP). RPKEP has user who has password, server which share the secret key information with user, and password recovery agency(PRA) which help to recover the user\`s password. Proposed protocol has some advantages that it is secure against off-line dictionary attack which is considered most important in password based key exchange protocol and suer\`s security is preserved even though user\`s secret information stored in the server is disclosed. By applying Chaum\`s blind signature scheme in the process of password recovery, even the PRA can\`t obtain any information about user\`s password.

(Buffer Management for the Router-based Reliable Multicast) (라우터 기반의 신뢰적 멀티캐스트를 위한 버퍼 관리)

  • 박선옥;안상현
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.407-415
    • /
    • 2003
  • As services requesting data transfer from a sender to a multiple number of receivers become popular, efficient group communication mechanisms like multicast get much attention. Since multicast is more efficient than unicast in terms of bandwidth usage and group management for group communication, many multicast protocols providing scalability and reliability have been proposed. Recently, router-supported reliable multicast protocols have been proposed because routers have the knowledge of the physical multicast tree structure and, in this scheme, repliers which retransmit lost packets are selected by routers. Repliers are selected dynamically based on the network situation, therefore, any receiver within a multicast group can become a replier Hence, all receivers within a group maintains a buffer for loss recovery within which received packets are stored. It is an overhead for all group receivers to store unnecessary packets. Therefore, in this paper, we propose a new scheme which reduces resource usage by discarding packets unnecessary for loss recovery from the receiver buffer. Our scheme performs the replier selection and the loss recovery of lost packets based on the LSM [1] model, and discards unnecessary packets determined by ACKs from erasers which represent local groups.