• 제목/요약/키워드: System Compatibility

Search Result 1,011, Processing Time 0.023 seconds

An Aesthetic Design Approach for the Landscape of Aqueduct Bridges (수로교 경관 개선을 위한 미학적 설계법)

  • Jeon, Geon Yeong;Kim, Namhee;Huh, Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.6A
    • /
    • pp.355-367
    • /
    • 2012
  • Many of old aqueduct bridges located in rural areas are in need of repair and redesign. They still occupy some portion of countryside landscaping. However, most of them were designed to fulfill their basic functions of carrying waters, which has not contributed to the landscape positively. Moreover, it is not rational to treat each design case of aqueduct bridges individually because they are relatively small in size and arranged continuously over a long path. Therefore, it is better to provide a design guideline to repair or to redesign old aqueduct bridges as a whole considering both structural safety and landscape. The main objective is to develop a framework to repair and redesign of old aqueduct bridges for safety improvement and better landscape. Specifically this paper will address the development of possible design alternatives for repair and redesign The development of design alternatives for redesign will follow general principle of bridge aesthetics and be represented according to structural system, flume shape, pier height, pier shape in terms of design parameters while minor repair includes paintings and other ornamentations. And the developed design alternatives will be reviewed with its landscape as a background to check the visual compatibility within the community context. It is expected that the proposed guideline will be utilized to develop a maintenance plan to revitalize old aqueduct bridges to improve overall landscape of rural areas.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Chemical Treatment of Leachate from Swine Manure Composting System (양돈분뇨 퇴비화공정에서 발생하는 침출액의 화학적처리)

  • 정태영;오인환;김동수
    • Journal of Animal Environmental Science
    • /
    • v.8 no.3
    • /
    • pp.145-152
    • /
    • 2002
  • This experiment was conducted to investigate the efficiency and compatibility of the coagulation and settling processes of leachates from the compost of two swine farms. And results obtained are as follows : 1 In the farm A where $COD_{Cr}$, $COD_{Mn}$ and $BOD_5$ of original leachate were 4,400, 2,950 and 87mg/l, respectively, the rate of coagulation and settling process was more efficient in the leachate treated with the conjugate of Alum and cation polymer than that of Alum and anion polymer. The concentrations of BOD$_{5}$, T-N and T-P of the effluent after treatment with the conjugate of Alum and cation polymer under the optimum condition were 19, 257.5 and 0.4mg/l, respectively which are under the governmental regulation level. 2. In the farm B where $COD_{Cr}$, $COD_{Mn}$ and $BOD_5$ of original leachate were 4,720, 3,040 and 95mg/l, respectively, the conjugate of $FeCl_3$, 1,500mg/l and cation polymer 10mg/l ($FeCl_3$+FO4240) was most effective coagulation and settling agent compared with the others. The concentrations of BOD$_{5}$, T-N and T-P of the effluent after treatment with $FeCl_3$+FO4240 were 15.3, 829.4 and 2.8mg/l, respectively. And the concentration of T-N was higher than the governmental regulation level, presumably because of too high concentration of NH$_4$$^{+}$-N in the leachate.

  • PDF

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

The Role of Archive as cultural memory in the age of Big Data (빅 데이터 시대 문화적 기억 보존소로서의 영상 아카이브의 역할)

  • Cho, Byung-Chul;Yuk, Hyun-Seung
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Recently, the value and the status of the digital archives that are built individually in the crossroads of oblivion and memory are due to big data has attracted attention globally is confusing. Video data that contains the cultural memory of the digital archive, such as culture, art, life, society, and social conditions of the time, it is a cultural heritage of national common expressed. Also, it remains a trace of history from the various media just like magazines, books, painting, photography, and film. Digital archive system is one of the best research results of media convergence and it has also a good opportunity to take full advantage of the new opportunities and cultural assets. The collection of infinite information of big data in perspective transient that exist at the same time compatibility of big data, it is trying to dismantle the cultural memory of us. It was asserted that must meet the criteria which can correspond to via the new digital era, will be applied to preserve the traditional media. The current image archive is necessary to accommodate proper two different directions.

Biaxial Interaction and Load Contour Method for Reinforced Concrete C- and H-shaped Structural Walls (C형 및 H형 철근콘크리트 구조벽체의 2축 상호작용과 등하중법)

  • Nam, Hye-Sung;Eom, Tae-Sung
    • Journal of the Korea Concrete Institute
    • /
    • v.29 no.2
    • /
    • pp.189-200
    • /
    • 2017
  • Nonplanar structural walls with C-shaped and H-shaped sections have been used as an efficient lateral force-resisting system for building structures. Since the nonplanar walls are subjected to axial load and bending moments about two orthogonal axes, complicated section analysis is required for flexure-compression design. In the present study, a straightforward design method for biaxially loaded C- and H-shaped walls was proposed by modifying the existing load contour method for columns with symmetric solid sections. For this, a strain compatibility section analysis program that can calculate biaxial moment strengths of arbitrary wall section was developed and its validity was verified by comparing with existing test results. Then, through parametric study, the interaction of biaxial moments at constant axial loads in prototype C- and H-shaped walls was investigated. The results showed that, due to unsymmetrical geometry of the wall sections, the biaxial interaction was significantly affected by the moment directions and axial loads. From those investigations, non-dimensional contour equations of the biaxial moments at constant axial loads for C- and H-shaped walls were suggested. Further, design examples using the proposed contour equations were given for engineering practice.

THE SHEAR BOND STRENGTH BETWEEN DICOR AND SEVERAL VENEERING PORCELAINS (Dicor와 수종 전장도재간의 전단결합강도)

  • Ryoo, Kyung-Hee;Lee, Sun-Hyung
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.31 no.2
    • /
    • pp.165-179
    • /
    • 1993
  • Dicor has not been prescribed routinely, in spite of many advantages, because of esthetic limitations by excessive translucency and external shading. In an attempt to solve these problems, the technique of veneering Dicor by aluminous poreclain has been used and recently Dicor Plus system was developed. The purpose of this study was to evaluate the compatibility between Dicor and several veneering porcelains by measuring the shear bond strength and observing the failure mode and interface appearance with SEM. Total 55 Dicor disks(10.0mm diam. X 3.0mm thickness) were fabricated by lost wax technique and divided into five groups of 11. Veneering porcelains such as Dicor Plus, Vitadur Alpha, Vitadur N, Vivodent, and Ceramco II were built up over the center of the treated Dicor surface using paper tube(5.0mm diam. X 4.0mm height) and fired according to the manufacturesr’instructions. A representative sample from each group was completely embedded in epoxy resin and crosssectioned, and remaining 50 samples were embedded in epoxy resin with the bonded area perpendicular to table base. The shear bond strengths were measured by applying the shear load parallel to Dicor surface close to the bonded area. Failure modes and interface appearances were observed using SEM at 15 and 1000 magnification respectively. The obtained results were as follows : 1. The mean shear bond strengths showed Dicor-Dicor Plus(10.53 MPa); Dicor-Vitadur Alpha(8.84 MPa); Dicor-Vitadur N(7.37 MPa); Dicor-Vivodent(4.28 MPa); Dicor-Ceramco II(0.89 MPa). 2. The shear bond strength of Dicor-CeramcoII was significantly decreased compared with Dicor-Dicor Plus(p<0.01), but had no significant difference compared with Dicor-Vivodent(p>0.01). 3. The shear bond strengths of Dicor-Vitadur Alpha and Dicor-Vitadur N were not significantly different compared with Dicor-Dicor Plus(p>0.01). 4. SEM examination of bond failure modes revealed that Dicor-Dicor plus, Dicor-Vitadur Alpha, Dicor-Vitadur N exhibited cohesive failure within Dicor and Dicor-Vivodent exhibited adhesive failure. And Dicor-Ceramco III exhibited adhesive failure and cohesive failure within CeramcoIII together. 5. SEM examination of interfaces revealed that Dicor-Dicor Plus exhibited the most tight contact and Dicor-Vitadur Alpha, Dicor-Vitadur N exhibited acceptible contacts. But Vivodent exhibited discontinuous gap and Ceramco II exhibited large continuous gap.

  • PDF

T-DMB Hybrid Data Service Part 1: Hybrid BIFS Technology (T-DMB 하이브리드 데이터 서비스 Part 1: 하이브리드 BIFS 기술)

  • Lim, Young-Kwon;Kim, Kyu-Heon;Jeong, Je-Chang
    • Journal of Broadcast Engineering
    • /
    • v.16 no.2
    • /
    • pp.350-359
    • /
    • 2011
  • Fast developments of broadcasting technologies since 1990s enabled not only High Definition Television service providing high quality audiovisual contents at home but also mobile broadcasting service providing audiovisual contents to high speed moving vehicle. Terrestrial Digital Multimedia Broadcasting (T-DMB) is one of the technologies developed for mobile broadcasting service, which has been successfully commercialized. One of the major technical breakthroughs achieved by T-DMB in addition to robust vehicular reception is an adoption of framework based on MPEG-4 System. It naturally enables integrated interactive data services by using Binary Format for Scene (BIFS) technology for scene description and representation of graphics object and Object Descriptor Framework representing multimedia service components as objects. T-DMB interactive data service has two fundamental limitations. Firstly, graphic data for interactive service should be always overlaid on top of a video not to be rendered out of it. Secondly, data for interactive service is only received by broadcasting channel. These limitations were considered as general in broadcasting systems. However, they are being considered as hard limitations for personalized data services using location information and user characteristics which are becoming widely used for data services of smart devices in these days. In this paper, the architecture of T-DMB hybrid data service is proposed which is utilizing broadcasting network, wireless internet and local storage for delivering BIFS data to overcome these limitations. This paper also presents hybrid BIFS technology to implement T-DMB hybrid data service while maintaining backward compatibility with legacy T-DMB players.

Application of Adaptive Loop Filter for NRT-Based Stereoscopic Video Coding (비실시간 기반 스테레오스코픽 비디오 부호화를 위한 적응루프필터 적용기법)

  • Lee, Byung-Tak;Lee, BongHo;Choi, Haechul;Kim, Jin-Soo;Yun, Kugjin;Cheong, Won-Sik;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.261-270
    • /
    • 2013
  • A stereoscopic 3D video service is able to provide a 3D video service while keeping backward compatibility with the existing 2D video service. In the terrestrial digital television (DTV) system, a stereoscopic video codec is required to have high coding efficiency in order to provide a 3D video service in the same channel capacity. A hybrid codec consisting of MPEG-2 for base video and H.264/AVC or HEVC for 3D auxiliary video is considered. Furthermore, Non-Real-Time (NRT) delivery of stereoscopic video is also considered as a service scenario for 3DTV services to overcome the limited bandwidth. In this paper, we propose a stereoscopic video coding scheme using adaptive loop filter (ALF) which had been considered in HEVC as a pre-/post-filter for enhancing coding efficiency in NRT-based 3DTV services. In order to apply ALF as a post-filter to the reconstructed additional view coded by H.264/AVC, we devise a method in which ALF is adaptively applied based on a structure determined by using macroblock (MB) coding information such as MB mode type and reference index instead of coding unit (CU) structure on which ALF is applied in the HEVC. Experimental results shows that the proposed stereoscopic video coding scheme applying ALF obtains up to 24.9% gain of bit saving.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).