• Title/Summary/Keyword: TLS 1.3

Search Result 40, Processing Time 0.025 seconds

Accuracy Analysis of Earthwork Volume Estimating for Photogrammetry, TLS, MMS (토공사 계측 방식(Photogrammetry, TLS, MMS)별 토공량 산정 정밀도 분석)

  • Park, Jae-Woo;Yeom, Dong-Jun;Kang, Tai-Kyung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_2
    • /
    • pp.453-465
    • /
    • 2021
  • Recently, photogrammetry, TLS(Terrestrial Laser Scanner), MMS(Mobile Mapping System)-based techniques have been applied to estimate earthwork volume for construction management. The primary objective of this study is to analyze the accuracy of earthwork volume estimating between photogrammetry and TLS, MMS that improves the traditional surveying method in convenience, estimating accuracy. For this, the following research works are conducted sequentially; 1) literature review, 2) core algorithm analysis, 3) surveying data acquisition using photogrammetry, TLS, MMS, 4) estimated earthwork volume comparison according to surveying method. As a result of the experiment, it was analyzed that there were earthwork volume errors of 1,207.5m3 (14.03%) of UAV-based digital map, 391.5m3(4.55%) of UAV, TLS integrated digital map, and 294.9m3(3.43%) of UAV, MMS integrated digital map. It is expected that the result of this study will be enormous due to the availability of the analyzed data.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

An Implement TLS VPN for Internet of Things (IoT기기를 위한 TLS VPN 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.191-192
    • /
    • 2015
  • 본 논문에서는 최근 급성장하는 사물인터넷(Internet of Things, IoT) 시장의 안전한 원격 네트워크 통신을 위한 가상사설망(Virtual Private Network, VPN) 구축을 TLS(Transport Layer Security, TLS 1.0 또는 SSL 3.0) 프로토콜을 사용하여 암호화 기술, 터널링 기술을 적용한 인증 기반의 안전한 통신망을 제공하는 목적에서 기술개발의 고도화를 추구한다.

  • PDF

Mechanism Study of Takli-San on the Anti-Cancer Action in Mice (탁이산(托裏散)이 항암(抗癌) 미치는 작용기전(作用機轉) 연구(硏究))

  • Choi, Jung-Hwa;Kim, Jong-Han;Park, Su-Yeon;Yu, Mi-Kyung
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.18 no.1
    • /
    • pp.71-81
    • /
    • 2005
  • Objective : This Study was to investigate effects of Takli-San on the anti-cancer and proliferation of immunocytes, nitric oxide(NO) production of peritoneal macrophages. Methods : We used Takli-San extract(TLS) with freeze-dried, 8wks-old male mice and cancer cell lines(L120, Sarcoma-180) for this Study. The cytotoxicity and proliferation of cells were tested using a colorimetric tetrazoliun assay(MTT assay). Results : 1. TLS was significantly showed cytotoxicity on the L1210 cell lines. 2. TLS was significantly increased proliferation of thymocytes and splenocytes in vitro. 3. TLS was significantly increased proliferation of thymocytes by all-dosage, but proliferation of splenocytes by low-dosage in normal mice. 4. TLS was significantly increased NO production from peritoneal macrophages in normal mice. 5. TLS was significantly decreased proliferation of L1210 cells in L1210 cells transplanted mice. 6. TLS was significantly increase proliferation of thymocytes by all-dosage, but proliferation of splenocytes by low-dosage in L1210 cells transplanted mice. 7. TLS was significantly increased NO production from peritoneal macrophages in L1210 cells transplanted mice. Conclusions : The present author thought that TLS had action of anti-cancer by becoming immunocytes activity(NO production, proliferation of thymocytes).

  • PDF

New EAP-TLS based on Password Authentication (패스워드 기반 EAP-TLS)

  • Lee, Sok-Joon;Nyang, Dae-Hun;Chung, Byung-Ho;Chung, Kyo-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1067-1070
    • /
    • 2002
  • EAP(Extensible Authentication Protocol)[3]은 다양한 인증 방법을 제공하기 위한 표준 인증 메커니즘이다. EAP는 PPP[16], 802.1x[17] 등에서 사용되며, 실제 인증 능력을 가지는 TLS[2] 등과 같은 인증 프로토콜과 결합하여 사용된다. TLS(Transport Layer Security)는 두 peer 간에 전송계층에서 상호 인증, 무결성, 기밀성을 제공하기 위해 개발되었다. TLS 는 상호 인증을 위하여 공개키 기반 인증서를 사용한다. 그러나, 인증서를 사용하는 것은 대부분의 사용자들이 ID, password 기반의 응용에 익숙하다는 것을 생각하면 일반적인 인증 방법이 아님을 알 수 있다. 따라서, EAP-TLS와 같은 인증 방법 역시 그런 면에서 PPP 혹은 802.1x에서 사용하기에 부적합하다고 볼 수 있다. 본 논문에서는 패스워드 기반 인증 및 키교환 프레임웍을 TLS 에 적용하고 이를 다시 EAP 와 결합한다. 패스워드 기반 EAP-TLS 는 인증서에 관련된 복잡한 연산을 수행하지 않으면서도 안전성에 있어 수학적 증명을 가지며, PPP 혹은 802.1x 서비스를 받고자 하는 사용자가 인증서를 가질 필요가 없는 장점을 가지게 된다.

  • PDF

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

A Study on 3D Road Extraction From Three Linear Scanner

  • Yun, SHI;SHIBASAKI, Ryosuke
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.301-303
    • /
    • 2003
  • The extraction of 3D road network from high-resolution aerial images is still one of the current challenges in digital photogrammetry and computer vision. For many years, there are many researcher groups working for this task, but unt il now, there are no papers for doing this with TLS (Three linear scanner), which has been developed for the past several years, and has very high-resolution (about 3 cm in ground resolution). In this paper, we present a methodology of road extraction from high-resolution digital imagery taken over urban areas using this modern photogrammetry’s scanner (TLS). The key features of the approach are: (1) Because of high resolution of TLS image, our extraction method is especially designed for constructing 3D road map for next -generation digital navigation map; (2) for extracting road, we use the global context of the intensity variations associated with different features of road (i.e. zebra line and center line), prior to any local edge. So extraction can become comparatively easy, because we can use different special edge detector according different features. The results achieved with our approach show that it is possible and economic to extract 3D road data from Three Linear Scanner to construct next -generation digital navigation road map.

  • PDF

Error-Prone and Error-Free Translesion DNA Synthesis over Site-Specifically Created DNA Adducts of Aryl Hydrocarbons (3-Nitrobenzanthrone and 4-Aminobiphenyl)

  • Yagi, kashi;Fujikawa, Yoshihiro;Sawai, Tomoko;Takamura-Enya, Takeji;Ito-Harashima, Sayoko;Kawanishi, Masanobu
    • Toxicological Research
    • /
    • v.33 no.4
    • /
    • pp.265-272
    • /
    • 2017
  • Aryl hydrocarbons such as 3-nitrobenzanthrone (NBA), 4-aminobiphenyl (ABP), acetylaminofluorene (AAF), benzo(a)pyrene (BaP), and 1-nitropyrene (NP) form bulky DNA adducts when absorbed by mammalian cells. These chemicals are metabolically activated to reactive forms in mammalian cells and preferentially get attached covalently to the $N^2$ or C8 positions of guanine or the $N^6$ position of adenine. The proportion of $N^2$ and C8 guanine adducts in DNA differs among chemicals. Although these adducts block DNA replication, cells have a mechanism allowing to continue replication by bypassing these adducts: translesion DNA synthesis (TLS). TLS is performed by translesion DNA polymerases-Pol ${\eta}$, ${\kappa}$, ${\iota}$, and ${\zeta}$ and Rev1-in an error-free or error-prone manner. Regarding the NBA adducts, namely, 2-(2'-deoxyguanosin-$N^2$-yl)-3-aminobenzanthrone (dG-$N^2$-ABA) and N-(2'-deoxyguanosin-8-yl)-3-aminobenzanthrone (dG-C8-ABA), dG-$N^2$-ABA is produced more often than dG-C8-ABA, whereas dG-C8-ABA blocks DNA replication more strongly than dG-$N^2$-ABA. dG-$N^2$-ABA allows for a less error-prone bypass than dG-C8-ABA does. Pol ${\eta}$ and ${\kappa}$ are stronger contributors to TLS over dG-C8-ABA, and Pol ${\kappa}$ bypasses dG-C8-ABA in an error-prone manner. TLS efficiency and error-proneness are affected by the sequences surrounding the adduct, as demonstrated in our previous study on an ABP adduct, N-(2'-deoxyguanosine-8-yl)-4-aminobiphenyl (dG-C8-ABP). Elucidation of the general mechanisms determining efficiency, error-proneness, and the polymerases involved in TLS over various adducts is the next step in the research on TLS. These TLS studies will clarify the mechanisms underlying aryl hydrocarbon mutagenesis and carcinogenesis in more detail.

Case for Detection and Prevention of Inflow Section for Contaminant through Annular Space in Borehole, Jeju Island (제주도 관정 공벽 내 오염물질 유입 구간 탐지 및 차단 사례)

  • Song, Sung-Ho;Hwangbo, Dongjun;Kim, Jin-Sung;Yang, Won-Seok
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Most wells developed in Jeju island before the enactment of the Groundwater Management Ordinance in 2002 are vulnerable to aquifer contamination due to inflow of upper groundwater having the high concentration of nitrate nitrogen, likely due to incomplete grouting in upper section of the wells. Although these wells require entire reinstallation, it is often necessary to rehabilitate the existing wells due to various constraints. Therefore, to identified the inflow section of contaminants, the thermal level sensor (TLS) technique was firstly applied for three wells, which enables to monitor temperature variations in every 50 cm depth. Then, the grouting material was injected to the upper section to prevent the inflow of upper contaminated groundwater into the entire aquifer. By applying TLS technique, it was found that the temperature deviations in the upper groundwater inflow section decreased sharply. Moreover, both the change in the concentration of nitrate nitrogen in the rainy/dry seasons and the average concentrations were found to decrease rapidly after grouting material injection. Consequently, the application of TLS proposed in the study turned out to be appropriate to prevent aquifer contamination.

Characteristics Analysis of Burned tree by Terrestrial LiDAR in Forest Fired Area of Pinus densiflora (지상라이다를 활용한 소나무 산불피해지의 임목 피해특성 분석)

  • Kang, Jin-Taek;Ko, Chi-Ung;Yim, Jong-Su;Lee, Sun-Jeoung;Moon, Ga-Hyun;Lee, Seung-Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_1
    • /
    • pp.1291-1302
    • /
    • 2020
  • To verify the field-effectiveness of Terrestrial Laser Scanner (TLS), a terrestrial LiDAR was deployed to examine the damage properties of woods in forest fire area, then the data was compared with the results surveyed by a forestry expert. Four sample plots (30 m × 50 m, 0.15 ha) were set from the foot to the top of the mountain, and DBH, height, clear length, burned height, and crown length were investigated. Next, TLS collected information on damage characteristics found in the sample plots. This information was then compared with that amassed by the expert. The expert and the TLS survey results showed 30.8 cm and 29.9 cm for DBH, 15.8 m and 17.5 m for tree height, 8.4 m and 8.4 m for clear length, 4.0 m, 3.5 m for burned height, and 7.4 cm and 9.1 cm for crown length. With the exceptions of height and clear length, no notable discrepancy was observed between two methods. H/D ratio, CL/H ratio, and BH/CL ratio, all of which contribute to stability and decay rate of the stand, from the two methods were also compared. The human survey rated each ratio (H/D, CL/H, BH/CL in order) 51.3%, 47.1%, and 53.6%, while the TLS presented the results of 58.8%, 52.0%, and 38.7%.