• Title/Summary/Keyword: Security operation center

Search Result 142, Processing Time 0.023 seconds

An ICI Canceling 5G System Receiver for 500km/h Linear Motor Car

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.27-34
    • /
    • 2023
  • This paper proposed an Inter-Carrier-Interference (ICI) Canceling Orthogonal Frequency Division Multiplexing (OFDM) receiver for 5G mobile system to support 500 km/h linear motor high speed terrestrial transportation service. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceler is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number 𝒏 to receiver sub-carrier number 𝒍 is generated. In case of 𝒏≠𝒍, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 2 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, for modulation schemes below 16QAM, we confirmed that the difference between BER in a 2 path reverse Doppler shift environment and stationary environment at a moving speed of 500 km/h was very small when the number of taps in the multi-tap equalizer was set to 31 taps or more. We also confirmed that the BER performance in high-speed mobile communications for multi-level modulation schemes above 64QAM is dramatically improved by the use of a multi-tap equalizer.

Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators

  • Barakat, Mohamed L.;Mansingka, Abhinav S.;Radwan, Ahmed G.;Salama, Khaled N.
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.448-458
    • /
    • 2013
  • This paper presents a generalized post-processing technique for enhancing the pseudorandomness of digital chaotic oscillators through a nonlinear XOR-based operation with rotation and feedback. The technique allows full utilization of the chaotic output as pseudorandom number generators and improves throughput without a significant area penalty. Digital design of a third-order chaotic system with maximum function nonlinearity is presented with verified chaotic dynamics. The proposed post-processing technique eliminates statistical degradation in all output bits, thus maximizing throughput compared to other processing techniques. Furthermore, the technique is applied to several fully digital chaotic oscillators with performance surpassing previously reported systems in the literature. The enhancement in the randomness is further examined in a simple image encryption application resulting in a better security performance. The system is verified through experiment on a Xilinx Virtex 4 FPGA with throughput up to 15.44 Gbit/s and logic utilization less than 0.84% for 32-bit implementations.

A Study on the Safety and Improvement of Small Theatres in Korea (소규모 공연장 안전실태 및 개선방안에 대한 연구)

  • Park, Yong Gyu;Kim, Dong Kyun;Park, Jin Kyu;Kim, Kyung Hoon
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.22-27
    • /
    • 2014
  • The market of performance arts industry such as concert, musical and opera etc is now expanding in Korea. However, the inadequate safety management in theatres often causes some accidents. The guarantee of safety in theatres is very important since the accidents in theaters can lead to many casualties and serious property damages. In particular, the small theatres which have no obligation of safety inspection by law are very vulnerable to safety mattes. This study has done the research into the improvement of safety in small theaters through the inspection and analysis of their safety status. For the purpose, this study has inspected and analyzed the safety status of small theaters over 120 in the field of theater management and operation, fire protection, electrical facilities, ceiling structure and etc. Moreover, this study had investigated the law and technical standards related to theatre safety. This study shows that the essentials to make sure of the safety in small theaters are (1) the education to improve the sense of security of people who work in theaters (2) the training to strengthen the operating skills of the facilities in theaters (3) the cooperation and support of the related organization such as technical research center, central and local government.

Implementation of file format analyzer for binary vulnerability analysis (바이너리 취약점 분석을 위한 파일 포맷 분석기 구현)

  • Oh, DongYeop;Ryu, Jea-cheol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.466-469
    • /
    • 2018
  • 최근 PC를 비롯한 모바일, IOT 기기 등 다양한 환경에서의 사이버 공격이 기승을 부리고 있으며, 그 방법 또한 나날이 발전하고 있다. 이러한 사이버위협으로부터 개인 및 기업의 자산을 지키기 위한 근본적인 대안이 없이는 매번 반복적인 피해를 피하기 어려운 현실이다. 다양한 환경이라고 함은, 다양한 OS(Operation System), 다양한 ISA (Instruction Set Architecture)의 조합으로 이루어지는 사이버환경을 의미한다. 이러한 조합들은 일반 사용자들에게 가장 많이 쓰이는 Windows & Intel 조합의 환경과, Linux & Intel 또는 Linux & ARM 등 기업에서 서비스를 위해 쓰이는 서버 환경 등을 예로 들 수 있다. 그밖에 최근 IOT기기나 모바일 기기와 같은 환경도 있을 수 있다. 바이너리 파일에 대한 보안은 다양한 연구가 진행되고 있지만 그 범위가 방대하고, 깊이가 필요한 영역이라 진입 장벽이 높은 실정이다. 본 논문에서는 이러한 바이너리의 취약점을 분석하기 위한 첫 번째 단계로써 다양한 바이너리 파일을 하나의 정형화된 자료구조로 변환하는 바이너리 포맷 분석기의 한 방법을 제시하고자 한다. 다양한 OS와 다양한 ISA환경에서 사용되는 바이너리들에서 공통적으로 존재하는 정보들 중, 바이너리의 취약점 분석을 위해 필요한 데이터를 보다 효율적으로 수집하고, 관리하는 것이 바이너리를 통한 사이버 위협을 탐지하는 연구에서 기초가 된다고 할 수 있기 때문이다.

  • PDF

The Effect of Xiaohongshu Service Quality on the Stickiness Through the Emotional Responses of Users

  • Jie, Xu;Park, Chanuk;Lee, Sin-Bok
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.183-197
    • /
    • 2021
  • Xiaohongshu is called China's Instagram and is leading overseas product purchases and culture sharing. The purpose of this study is to investigate the structural relationship between Xiaohongshu service quality, emotional response perceived by users, and adhesion to confirm the impact on Xiaohongshu's adhesion at a time when non-face-to-face activities due to COVID-19 have increased. This study distributed and collected questionnaires from October 1st to October 7th, 2021, targeting 210 online shopping mall users. The research results were derived from a total of 206 questionnaires, excluding 4 questionnaires such as omission of record contents, and the causal relationship of the existing PAD model was attempted to be reported by revising and supplementing the existing PAD model. As a result of the study, first, it was confirmed that design among service quality had a positive effect only on ventilation during the user's emotional response. Second, it was confirmed that information among service quality had a positive effect on pleasure and ventilation among users' emotional responses. Third, it was found that security among service quality had a positive effect on pleasure among users' emotional responses. Finally, it was found that pleasure and ventilation had a positive effect on adhesion in the user's emotional response. Based on this result, it is expected that it will be used for operation on other online platforms than the plan for the development of Xiaohongshu.

A Study on the Performance Level of Industrial Robot Cell Safety Function Control System (산업용 로봇 셀 안전기능 제어시스템 성능수준 연구)

  • Jung-nam Lee;Dong-ho Rie
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.3
    • /
    • pp.1-9
    • /
    • 2023
  • Most existing industrial robots have fences installed around them to ensure safety. However, industrial sites are recently being transformed into workspaces shared by both robots and humans working cooperatively, wherein the robots are without security fencing owing to the development of sensor technology. However, in the last five years (2017-2021), 16 deaths have occurred due to robots at industrial sites, with the main cause of the accidents being workers approaching an industrial robot in operation and getting entangled with or colliding into the robot and its peripherals. To prevent such accidents, multilateral research is needed. To this end, this study analyzes the nonconforming contents of safety inspections for industrial robots and demonstrates the safety performance of the safety function control system implemented in an industrial robot cell. In addition, to ensure the fundamental safety of industrial robots, this study proposes the introduction of a safety certification system so that safety functions can be implemented in the design, manufacturing, and installation stages of the robots.

Operation Plan of Big Data Prediction Model using Cut-off-Voting Classifier in Administrative Big Data Environment (행정 빅데이터 환경에서 컷오프-투표 분류기를 활용한 빅데이터 예측모형의 실험)

  • Woosik Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.145-154
    • /
    • 2024
  • In order to operate predictive models utilizing administrative big data, it is crucial to consider policy changes and the characteristics of highly volatile data. Considering this scenario, this study proposes the Cut-off Voting Classifier (CVC) algorithm. This proposed algorithm prevents a sharp decline in accuracy by utilizing multiple weak classifiers. The study validates the proposed algorithm's performance through experiments. The performance evaluation demonstrates the ability to maintain stable prediction rates even in situations with a sharp decline in predictive model accuracy.

A Study on the Throughput Enhancement in Software Implementation of Ultra Light-Weight Cryptography PRESENT (초경량 암호 PRESENT의 소프트웨어 구현 시 처리량 향상에 대한 연구)

  • Park, Won-kyu;Cebrian, Guillermo Pallares;Kim, Sung-joon;Lee, Kang-hyun;Lim, Dae-woon;Yu, Ki-soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.316-322
    • /
    • 2017
  • This paper suggests an efficient software implementation of lightweight encryption algorithm PRESENT which supports for secret key lengths of 80-bits. Each round of PRESENT is composed of the round key addition, substitution, and permutation and is repeated 31 times. Bo Zhu suggested combined substitution and permutation for efficient operation so that encryption throughput has been increased 2.6 times than processing substitution and permutation at separate times. The scheme that suggested in this paper improved the scheme of Bo Zhu to reduce the number of operation for the round key addition, substitution, and permutation. The scheme that suggested in this paper has increased encryption throughput up to 1.6 times than the scheme of Bo Zhu but memory usage has been increased.

A Study on the Design of System Access Control Software For the Improvement of the Stability and Survivability of Naval Combat Management System

  • Jong-Hyeon Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.137-145
    • /
    • 2023
  • In this paper, we propose system access control software that improves the survivability of the naval combat system while maintaining security and stability. The software was improved by improving the operating environment configuration and user authentication process of the system access control software that constitutes the naval combat system, defining the operating environment classification of the naval combat system, and applying a software parallel execution process considering the load rate. Through this, the waiting time required to configure the environment is shortened, providing rapid operation to the operator, and improving the fact that the naval combat system cannot be operated unless the environment configuration is completed even in emergency situations. In order to test the performance, a test environment was created by simulating the existing naval combat system, and the execution time for each operation category was measured and compared. Compared to the existing naval combat system, the execution time of the basic combat system was reduced by about 69.3%, the execution time of the combat system was reduced by about 54.9%, and the execution time of the integrated combat system was confirmed to be reduced by about 8.4%.

A Study on the Combination of the Existing Monitoring System with the Safety Management Network System (기구축 계측시스템의 안전관리 네트워크 시스템 연계 방안에 관한 연구)

  • Lee, Chin-Hyung;Park, Ki-Tae;You, Young-Jun;Joo, Bong-Chul;Hwang, Yoon-Koog;Bae, In-Hwan
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.47-53
    • /
    • 2009
  • This study performed the construction of test bed for the combination of the health monitoring system In Yongjong grand bridge with the safety management network system in order to explore the feasibility of combining the existing monitoring system with the safety management network system. For this purpose, connection program which consists of DAQ sender server program and DAQ receiver server program has been developed. DAQ sender server program installed in the connection server, which is located on the DMZ zone of the existing monitoring system, plays the role of communicating with the monitoring system. On the other hand, DAQ receiver server program installed in the connection server, which is located on the integrated operation center of the safety management network system, plays the part of gathering real time and tim history data of the existing monitoring system and storing them in the integrated operation server through the communication with the DAQ sender. Test bed demonstrated the feasibility of combining the existing monitoring system with the safety management network system.

  • PDF