• Title/Summary/Keyword: Time stamp

Search Result 151, Processing Time 0.023 seconds

DoS-Resistance Authentication Protocol for Wreless LAN (DoS 공격에 강한 무선 랜 인증 프로토콜)

  • 김민현;이재욱;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.3-10
    • /
    • 2004
  • A Wireless Lan has an importance of access control, because we can use wireless Internet via AP(Access Point). Moreover, to use wireless LAN, we will go through authentication process of EAP. DoS(Denial of Service) attack is one of the fatal attack about these AP access and authentication process. That is, if malicious attacker keeps away access of AP or consumes memory of server and calculation ability of CPU and etc. compulsorily in authentication process, legal user can't get any services. In this paper, we presents the way of protection against the each attack that is classified into access control, allocation of resource, attack on authentication protocol. The first thing, attack to access control, is improved by pre-verification and the parameter of security level. The second, attack of allocation of resource, is done by partial stateless protocol. And the weak of protocol is done by time-stamp and parameter of access limitation.

TILT CORRECTION FOR A WIDE-FIELD ON-AXIS TELESCOPE USING THE SYMMETRICITY OF OPTICAL ABERRATIONS

  • Lee, Chung-Uk;Kim, Yunjong;Kim, Seung-Lee;Lee, Dong-Joo;Cha, Sang-Mok;Lee, Yongseok;Kim, Dong-Jin
    • Journal of The Korean Astronomical Society
    • /
    • v.54 no.4
    • /
    • pp.113-119
    • /
    • 2021
  • It is difficult for observers to conduct an optical alignment at an observatory without the assistance of an optical engineer if optomechanical parts are to be replaced at night. We present a practical tilt correction method to obtain the optimal optical alignment condition using the symmetricity of optical aberrations of a wide-field on-axis telescope at night. We conducted coarse tilt correction by visually examining the symmetry of two representative star shapes obtained at two guide chips facing each other, such as east-west or north-south pairs. After coarse correction, we observed four sets of small stamp images using four guide cameras located at each cardinal position by changing the focus positions in 10-㎛ increments and passing through the optimum focus position in the range of ±200 ㎛. The standard deviation of each image, as a function of the focus position, was fitted with a second-order polynomial function to derive the optimal focus position at each cardinal edge. We derived the tilt angles from the slopes converted by the distance and the focus position difference between two paired guide chip combinations such as east-west and north-south. We used this method to collimate the on-axis wide-field telescope KMTNet in Chile after replacing two old focus actuators. The total optical alignment time was less than 30 min. Our method is practical and straightforward for maintaining the optical performance of wide-field telescopes such as KMTNet.

A Re-analysis of the Effects of Individual Personality and Idea Stimulation on Idea Generation Performance (외향성·내향성 성격 차이가 그룹 아이디어 생산에 미치는 영향에 관한 연구의 재해석)

  • Jung, Joung-Ho
    • The Journal of Information Systems
    • /
    • v.24 no.3
    • /
    • pp.133-154
    • /
    • 2015
  • Purpose This study re-analyzes Jung 2012's data using the time interval based analysis to examine if the process of idea generation is in good currency throughout the ideation sessions. In this way, the relationship between extraversion-introversion personality trait and ideation performance in the context of computer-mediated idea generation can be better understood. Design/methodology/approach A $2{\times}4$ factorial design was used, crossing personality differences (extraversion and introversion) with the degree of stimuli (0, 20, 40, and 80 high-quality ideas). Participants were randomly assigned to one of eight treatment conditions. The group simulator is used to measure individual level performance. The number of unique ideas generated by individuals and the exact time stamp when each idea was submitted were analyzed to compare performances. Findings The results show that introverts' performances significantly drops after about the middle stage of the ideation session, whereas extraverts do not seem to feel time constraints throughout the ideation session, resulting in superior divergent thinking, which is a major key to understand creative productivity in the problem-solving process. Since extraverts tend to yield a larger pool of ideas, another interpretation is that group composition with extraverts compared with introverts may create a logically larger group, which is important to improve the performance of idea generation group.

A Study on Test Report Information Service Architecture for Preventing Forgery and Alteration in Defense Industry (군수품 시험성적서 위·변조 방지 시스템 아키텍처에 대한 연구)

  • Lee, Donghun;Jeon, Sooyune;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Preventing the forgery and alteration of test reports is important, in order to maintain the reliability of military supplies. Based on a survey of reports on testing institutions and a case study of established electronic document systems in the public sector, we propose a system architecture, which helps prevent the forgery and alteration of test reports with legal force. The proposed architecture takes advantage of both the time stamp that records the time a document is received and a server synchronized with the testing institution. Using the proposed system architecture, the user is able to request a test and receive reports from the testing institution without delay. Also, a defense agency is able to conveniently prove the authenticity of the test reports and utilize the statistical data collected by the architecture. Therefore, we expect that the proposed system architecture will help defense agencies to prevent the forgery and alteration of test reports and ensure their reliability and quality.

A Comparative Study of Block Chain : Bitcoin·Namecoin·MediBloc (블록체인 비교연구: 비트코인·네임코인·메디블록)

  • Kim, Ji Yeon
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.217-255
    • /
    • 2018
  • Bitcoin, which appeared in 2008, was merely a conceptual virtual currency, but it now enjoys the status as actual money. Bitcoin is an electronic money system that can be traded directly without a central trust institution. Thanks to the popularization of Bitcoin, blockchain technology has become a widespread concern. That technology is expanding not only the currency mechanism, but also a variety of other services. The possibility of a blockchain in relation to actual currency is ongoing. This paper investigates the technological characteristics and social construction of the blockchain by comparing the cases of Bitcoin, Namecoin, and MediBloc among blockchain applications. Namecoin emerged in 2013 is an attempt to replace the centralized Internet Domain Name System(DNS). There has been controversy over that current system for a long time, but replacing the already established system is not easy. Nevertheless, Namecoin has potential as an alternative. Meanwhile, MediBloc is an application that involves distributed management of medical data in South Korea. MediBloc claims that the key producers of medical data are patients themselves. This is to challenge to the question who is a knowledge producer of medical data. Through these three cases, it has discussed that blockchain technology does supports to form more democratic decision-making or simply provide a technical solution as automation. As a citizen, we can intervene in the realization of blockchains by presenting social agenda. This will be a method of the social construction of technology.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Current conditions regarding dental infection management recognition of students in the department of dental hygiene (치위생(학)과 학생의 치과감염관리에 관한 인식현황)

  • Lee, Yeun-Kyoung;Kim, Soon-Duck
    • Journal of Korean society of Dental Hygiene
    • /
    • v.9 no.3
    • /
    • pp.468-478
    • /
    • 2009
  • This research was performed to provide basic data for the development of infection related dental hygiene studies by surveying the current condition of recognition among students in the department of dental hygiene toward hospital infection management while receiving the following results by using a personal self-administered survey method targeting 303 students in the department of dental hygiene from certain areas. 1. With the current condition of recognition on the sanitization and sterilization of instruments among students in the department of dental hygiene(study), the rate at which surgical instruments are to be sterilized with autoclaves was 79.9% which was relatively higher than other instruments while it was shown that prosthetic instruments for treatment was 56.4%, conservative instruments for treatment was 51.8%, and ultrasonic scaler tip was 51.1% while the way syringe tips(36.1%) and the dental anesthetic apparatus(27.9%) were revealed to require sanitization by alcohol. 2. The 'hand wash' area was the highest with 4.71 while the 'materials and environment management' area and 'equipment management' area appeared high respectively with 4.43 and 4.41. 3. With the current condition of recognition on equipment management, 'equipments used for contagious patients are separately washed after a one-time use and must be sterilized or separated-and-discarded' was the highest with 4.82 while 'sterilization equipments with humidity or water on it are considered contaminated and are not used' showed the lowest recognition level with 3.90. 4. Regarding the current condition of materials and environment management, 'contagious and general trash are separated and discarded' was the highest with 4.70 while 'the refrigerator for medicine storage is cleaned on a regular basis once a month' was revealed as the lowest with 4.11. 5. With the current condition of recognition on hand washing, 'one must wash their hands after coming in contact with contagious patients, was the highest with 4.90 while washing hands after taking off gloves' appeared as the lowest with 4.51 point. To conclude department of dental hygiene there is to infection management and necessary about organization disinfecting and pasteurization to strengthen an education in order raising a stamp helping practical ratio about the infection management which whole, is from presence at a sickbed and connection does and about the infection management which is substantial and educational program development leads feed with the fact that deepening studying which is continuous must become accomplished becomes.

  • PDF

Automated Vehicle Research by Recognizing Maneuvering Modes using LSTM Model (LSTM 모델 기반 주행 모드 인식을 통한 자율 주행에 관한 연구)

  • Kim, Eunhui;Oh, Alice
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.4
    • /
    • pp.153-163
    • /
    • 2017
  • This research is based on the previous research that personally preferred safe distance, rotating angle and speed are differentiated. Thus, we use machine learning model for recognizing maneuvering modes trained per personal or per similar driving pattern groups, and we evaluate automatic driving according to maneuvering modes. By utilizing driving knowledge, we subdivided 8 kinds of longitudinal modes and 4 kinds of lateral modes, and by combining the longitudinal and lateral modes, we build 21 kinds of maneuvering modes. we train the labeled data set per time stamp through RNN, LSTM and Bi-LSTM models by the trips of drivers, which are supervised deep learning models, and evaluate the maneuvering modes of automatic driving for the test data set. The evaluation dataset is aggregated of living trips of 3,000 populations by VTTI in USA for 3 years and we use 1500 trips of 22 people and training, validation and test dataset ratio is 80%, 10% and 10%, respectively. For recognizing longitudinal 8 kinds of maneuvering modes, RNN achieves better accuracy compared to LSTM, Bi-LSTM. However, Bi-LSTM improves the accuracy in recognizing 21 kinds of longitudinal and lateral maneuvering modes in comparison with RNN and LSTM as 1.54% and 0.47%, respectively.

A Study on the Palsapum (八賜品, Eight-Bestowed Things), Treasure No. 440, in Tong-Yong Shrine to the Loyal Dead in Korea (보물 제440호 통영 충렬사 팔사품(八賜品) 연구)

  • Jang, Kyung-hee
    • Journal of Korean Historical Folklife
    • /
    • no.46
    • /
    • pp.195-237
    • /
    • 2014
  • Palsapum are ornaments to reveal the purpose of commander of three naval forces as well as symbols to remember the greatness of admiral Yi, Sun-Shin. In 1966, ther were designated as a treasure No. 440 based on their value; however, they have not received attention from academia because they are relics from China. This study compares and analyzes the document, paintings, and relevant references from Korea and China focusing on Palsapum, understands their formal characteristics, and examines their historical value such as years and location of creation. As a result, the study determines five of them are original, but three of them were newly created by the later generations. The five, Dodogin (都督印, Commander's seal)·Yeongpae (令牌, Commander's tablet)·Gwido (鬼刀, Replica of the devil sword)·Chamdo (斬刀, Replica of the decapitation swor d)·and Gognapal (bugle) were created by Ming Dynasty before 1598, and delivered by the hands of General Chen Lin. The other three, Dokjeongi (督戰 旗, Battle flag)·Hongsoryeonggi (紅小令旗, Commander's flag)·and Namsoryeonggi (藍小令旗, Commander's flag), were created in 19th century by Joseon Dynasty. After analysis on the former relics, the study determines that they are not official relics with the dignity of Ming Dynasty but personal relics with regional characteristics; in other words, Palsamun are not the royal gifts from Emperor Shenzong to Admiral Yi, Sun-Shin. but personal momentoes left by General Chen Lin in the Tongjeyoung to celebrate the admiral. The names, variety, numbers, and appurtenances of Palsapum have been changed with time as follows. First, the scholars of Jeseon in 17the century only focused on Dodogin. It was certainly created in Ming Dynasty; however, it was a personal stamp, so considered to be not from the emperor but from General Chen Lin. Second, Palsapum was called Palsamul and consisted of 14 pieces of 8 kinds in 18the century, ; it is confirmed on the 「Dosul(圖說, stories with pictures of」 『Yi Chungmugong Literary Collection』 The sizes of five relics including Dodogin are similar to the records, but their patterns and shapes are exotic, or cannot be found in Joseon. Thus, they reflect the regional characteristics of Guangdong province. Third, they were called Palsapum, and consisted on 15 pieces of 8 kinds in 19th century; it is confirmed on , a sixteen-fold folding screen drawn by Shin, Gwan-Ho in 1861. The stamp box, tablet bag, and three flags were newly created to engrave Joseon style letters and patterns on damageable materials such as leather and cloth. The relics easy to be destroyed have been renewed even after 19th century. Last, there are many misunderstandings about Palsapum by governmental indifference and improper management of records even though they were designated as a treasure in very early times. Thus, authorities should be concerned with Palsapum to provide the measures for stable maintenance of the relics; this will let people remember not only the history of cooperation between Korea and China to stop the Japanese ambition, but also Admiral Yi, Sun-Shin and General Chen Lin to bring victory in Japanese invasions of Korea.

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.