• Title/Summary/Keyword: Trace-back

Search Result 153, Processing Time 0.026 seconds

Studies on Partition and Extraction Equilibria of Metal-Dithiocarbamate Complexes(Ⅰ). Solvent Extraction of Inorganic Trace Mercury(Ⅱ) (Dithiocarbamate 금속착물의 분배 및 추출평형 (제 1 보) 흔적량 무기수은(Ⅱ)의 용매추출)

  • Ho-Seong Choi;Jong-Moon Choi;Hee-Seon Choi;Young-Sang Kim
    • Journal of the Korean Chemical Society
    • /
    • v.38 no.12
    • /
    • pp.898-907
    • /
    • 1994
  • The solvent extraction of an inorganic trace mercury in sea water samples was studied using zinc diethyldithiocabamate $Zn(DDC)_2$ as chelating agent. The $Zn(DDC)_2$ which maintained the stability of DDC- in the acidic aqueous solution in the course of extraction was synthesized from NaDDC and $ZnSO_4$ in this laboratory. The trace of mercury(Ⅱ) was extracted at pH 3.0 from 100 ml of sea water into 10ml of chloroform containing 0.05 M $Zn(DDC)_2$ by shaking for 5 minutes. And from the organic phase, the $Hg(DDC)_2$ was back-extracted into 10ml of 1 to 1 mixed acid of each 3% (v/v) nitric acid and hydrochloric acid by shaking for 25 minutes. The mercury back-extracted was determined by a cold vapor atomic absorption spectrophotometry. The trace mercury(Ⅱ) was so successfully extracted that this procedure could be applied to its determination in the sea water. That is, the recoveries of mercury in two kinds of samples into which as given amount of Hg(Ⅱ) was spiked were 90.0% and 93.3%, respectively.

  • PDF

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

The Growth of Defects $ZnWO_4$ Single Crystals ($ZnWO_4$ 단결정 성장과 결함)

  • 조병곤;오근호
    • Journal of the Korean Ceramic Society
    • /
    • v.27 no.4
    • /
    • pp.447-456
    • /
    • 1990
  • ZnWO4 single crystals were grown by Czochralski method. And the orientation of grown crystals were determined by Laue back reflection, and the crystals were siliced at (100), (010), (001) face before polishing. The morphologys and distribution of etch pits on each face were observed by optical microscopy. In the present study, we understood that dislocation distributjioon rely on shape of solid-liquid interface, and secondary phase acts on the dislocation source. We also observed dislocation trace(etch pits) of (100) slip plane on (010) cleavage plane.

  • PDF

A Study of Radio Signal Tracking using Error Back Propagation (오차 역전파 알고리즘을 이용한 전파신호 추적 연구)

  • 김홍기;김현빈;신욱현;이원돈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.226-229
    • /
    • 2001
  • Radio signal tracking has been developed especially in military as well as in other industries. It is necessary that an adaptive system trace the signal varying its PRI and frequency. In this paper we proposed a system to adapt various PRI and frequency using a neural network model named Error Back Propagation. Fist we prepared learning data by separating signal into time intervals and did some experiments with the teaming data. We found that the system had good effectiveness in tracing varying PRI and frequency signals.

  • PDF

Effective RFID Authentication Using Hash Function (해시 함수를 이용한 효율적인 RFID 인증)

  • Shin, Hyo-Young;Jung, Gye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1171-1177
    • /
    • 2010
  • Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.

Efficient DSP Architecture for Viterbi Algorithm (비터비 알고리즘의 효율적인 연산을 위한 DSP 구조 설계)

  • Park Weon heum;Sunwoo Myung hoon;Oh Seong keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.217-225
    • /
    • 2005
  • This paper presents specialized DSP instructions and their architecture for the Viterbi algorithm used in various wireless communication standards. The proposed architecture can significantly reduce the Trace Back (TB) latency. The proposed instructions perform the Add Compare Select (ACS) and TB operations in parallel and the architecture has special hardware, called the Offset Calculation Unit (OCU), which automatically calculates data addresses for the trellis butterfly computations. Logic synthesis has been Performed using the Samsung SEC 0.18 μm standard cell library. OCU consists of 1,460 gates and the maximum delay of OCU is about 5.75 ns. The BER performance of the ACS-TB parallel method increases about 0.00022dB at 6dB Eb/No compared with the typical TB method, which is negligible. When the constraint length K is 5, the proposed DSP architecture can reduce the decoding cycles about 17% compared with the Carmel DSP and about 45% compared with 7MS320c15x.

Time Delay Traceback Scheme for Performance Enhancement of TDOA Location Estimation in NLOS Environment (NLOS 환경에서 TDOA 위치 추정 성능 향상을 위한 시간 지연 역추적 기법)

  • Lee, Hyun-Jae;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.297-306
    • /
    • 2012
  • In this paper, we propose a Time Delay Traceback Scheme for the TDOA location estimation performance enhancement in NLOS environment and analyze the performance in various conditions. We place multiple readers in a square($300m{\times}300m$) searching area for reuse of received signal. Also, we use more active NLOS reader detection methode for NLOS error mitigation. when NLOS time delay 70 m, the number of the NLOS reader is 3 and the received sub-blinks number 3, proposed time delay trace-back scheme improve the RMSE about 16 m. From these results, we confirm that the proposed time delay traceback scheme is well-suited for the high precision location estimation to offer the location based service.

Implementation of Channel Coding System using Viterbi Decoder of Pipeline-based Multi-Window (파이프라인 기반 다중윈도방식의 비터비 디코더를 이용한 채널 코딩 시스템의 구현)

  • Seo Young-Ho;Kim Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.587-594
    • /
    • 2005
  • In the paper, after we propose a viterbi decoder which has multiple buffering and parallel processing decoding scheme through expanding time-divided imput signal, and map a FPGA, we implement a channel coding system together with PC-based software. Continuous input signal is buffered as order of decoding length and is parallel decoded using a high speed cell for viterbi decoding. Output data rate increases linearly with the cell formed the viterbi decoder, and flexible operation can be satisfied by programming controller and modifying input buffer. The tell for viterbi decoder consists of HD block for calculating hamming distance, CM block for calculating value in each state, TB block for trace-back operation, and LIFO. The implemented cell of viterbi decoder used 351 LAB(Logic Arrary Block) and stably operated in maximum 139MHz in APEX20KC EP20K600CB652-7 FPGA of ALTERA. The whole viterbi decoder including viterbi decoding cells, input/output buffers, and a controller occupied the hardware resource of $23\%$ and has the output data rate of 1Gbps.

A study on the experimental model of supplementary measures for food safety certification system of GAP (우수농산물 관리제도의 안전성 인증기능 보완을 위한 시험 모형연구)

  • Yoon, Jae-Hak;Ko, Seong-Bo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3384-3389
    • /
    • 2009
  • There are two major problems with current National GAP system. One was false in traceability record because it was written or inputted by farmers or distributers and no other measures to check the accuracy was valid. The other was incapability of tracking back and recalling the contaminated agricultural products. For solving these matters, IT convergence model which combined information technology with agricultural experience is elaborated. In IT convergence model, video analytic system classifies every activity depending on the pre-programmed farming process and create the traceability data automatically. Also real time trace system based on USN would solve the problem of tracking back. This system transmits the present location and monitors data of agricultural products from farm to table at all times.

A Energy Theft Traceback Protocol in a Smart Grid Environment (스마트 그리드 환경에서 에너지 도둑 추적 프로토콜)

  • Jeong, Eun-Hee;Lee, Byung-Kwan;Ahn, Hui-Hak
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.534-543
    • /
    • 2015
  • This paper proposes an Energy Theft Traceback Protocol(ETTP) based on Logging and Marking that can trace Energy Theft back in Smart Grid Environment. The ETTP consists of the following three phases. First, it classifies Energy Theft Type into Measurement Rejection and Data Fabrication by generating an Energy Theft Tree. Second, it detects an Energy Theft by using the Energy Theft Tree. Finally, it trace an Energy Theft back by using the Logging Table of a Router and the Marking Information of a Packet. The result of its simulation shows that the Detection Ratio of Energy Theft is estimated at 92% and the Success Ratio of Energy Theft Traceback at 93%. Therefore, the ETTP not only reduces such risk factors as Forgery and Tampering about Billing information but also provides safe and reliable Smart Grid environment.