• 제목/요약/키워드: Vault

검색결과 212건 처리시간 0.047초

남자 체조 YANG-1과 YANG-2 도마 동작의 운동학적 비교 (Kinematic Comparisons between Yang-1 and Yang-2 Vaults in Men's Artistic Gymnastics)

  • 박철희;김영관
    • 한국운동역학회지
    • /
    • 제24권4호
    • /
    • pp.317-327
    • /
    • 2014
  • As a single subject study, it was purposed to investigate kinematic differences between Yang Hak Seon vault (i.e., handspring forward and salto forward straight with triple twist, Yang-1 vault hereafter) and Tsukahara $1260^{\circ}$ twist with salto forward straight (Yang-2 vault hereafter) in gymnastics. Yang Hak-Seon (23 years, 160 cm, and 52 kg) voluntarily participated in this study. Motion capture system, consisting of fourteen cameras, were used to measure Yang-2 vault with the sampling rate of 200 Hz. Twenty six reflective markers were placed on major anatomical points of 15 body segments. Successful two trials of Yang-2 vault were collected and analyzed for the comparison. Compared Yang-1 results were based on the previous study of Park and Song (2012). Results indicated superior linear kinematics of Yang-1 vault to those of Yang-2 vault before the touchdown of vault table. However, Yang-2 vault revealed superior angular kinematics to Yang 1 vault showing more trunk twist angle (a triple and a half twist) and its faster angular velocity during the airborne. The Yang 2 vault could has advantage of increasing angular motion than Yang 1 vault as a result of a half turn off the springboard onto the vault table and a sequential touchdown of the hands.

은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구 (A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps)

  • 김대규;김창수
    • 인터넷정보학회논문지
    • /
    • 제23권2호
    • /
    • pp.61-70
    • /
    • 2022
  • 스마트폰 앱을 사용하는 일반 사용자들은 개인이 소유하고 있는 사진, 동영상 등 개인정보를 보호하기 위해 Vault 앱을 많이 사용하고 있다. 그러나 범죄자들은 불법 영상들을 은닉하기 위해 Vault 앱 기능을 안티포렌식 용도로 악용하는 사례가 증가하고 있다. 이러한 앱들은 구글 플레이에 정상적으로 등록된 매우 많은 앱들 중 하나이다. 본 연구는 범죄자들이 이용하고 있는 Vault 앱들을 탐색하기 위해 XML 기반의 핵심어 빈도 분석을 통해 특징점을 추출하는 방법론을 제안하며, 특징점 추출을 위해서는 텍스트마이닝 기법을 적용한다. 본 연구에서는 은닉형 Vault 안티포렌식 앱과 비은닉형 Vault 앱 각각 15개를 대상으로 앱에 포함된 strings.xml 파일을 활용하여 XML 구문을 비교 분석하였다. 은닉형 Vault 안티포렌식 앱에서는 불용어처리를 1차, 2차 거듭할수록 더 많은 은닉 관련 단어가 높은 빈도로 발견된다. 본 연구는 공학 기술적인 관점에서 APK 파일을 정적 분석하는 대부분의 기존 방식과는 다르게 인문사회학적인 관점에서 접근하여 안티포렌식 앱을 분류해내는 특징점을 찾아내었다는 것에 의의가 있다. 결론적으로 XML 구문 분석을 통해 텍스트마이닝 기법을 적용하면 은닉형 Vault 안티포렌식 앱을 탐색하기 위한 기초 자료로 활용할 수 있다.

Seismic analysis of a masonry cross vault through shaking table tests: the case study of the Dey Mosque in Algiers

  • Rossi, Michela;Calderini, Chiara;Roselli, Ivan;Mongelli, Marialuisa;De Canio, Gerardo;Lagomarsino, Sergio
    • Earthquakes and Structures
    • /
    • 제18권1호
    • /
    • pp.57-72
    • /
    • 2020
  • This paper presents the results of a monodirectional shaking table test on a full-scale unreinforced masonry cross vault characterized by asymmetric boundary conditions. The specimen represents a vault of the mosque of Dey in Algiers (Algeria), reproducing in detail the mechanical characteristics of masonry, and the constructive details including the presence of some peculiar wooden logs placed within the vault's abutments. The vault was tested with and without the presence of two steel bars which connect two opposite sides of the vault. The dynamic behaviour of both the vault's configurations were studied by using an incremental dynamic analysis up to the collapse of the vault without the steel bars. The use of an innovative high-resolution 3D optical system allowed measure displacement data of the cross vault during the shake table tests. The experimental results were analysed in terms of evolution of damage mechanisms, and in-plane and out-of-plane deformations. Moreover, the dynamic properties of the structure were investigated by means of an experimental modal analysis.

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

A Simple Fingerprint Fuzzy Vault for FIDO

  • Cho, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5674-5691
    • /
    • 2016
  • Fast IDentity Online(FIDO) supports biometric authentications in an online environment without transmitting biometric templates over the network. For a given FIDO client, the "Fuzzy Vault" securely stores biometric templates, houses additional biometric templates, and unlocks private keys via biometrics. The Fuzzy Vault has been extensively researched and some vulnerabilities have been discovered, such as brute force, correlation, and key inversions attacks. In this paper, we propose a simple fingerprint Fuzzy Vault for FIDO clients. By using the FIDO feature, a simple minutiae alignment, and point-to-point matching, our Fuzzy Vault provides a secure algorithm to combat a variety of attacks, such as brute force, correlation, and key inversions. Using a case study, we verified our Fuzzy Vault by using a publicly available fingerprint database. The results of our experiments show that the Genuine Acceptance Rate and the False Acceptance Rate range from 48.89% to 80% and from 0.02% to 0%, respectively. In addition, our Fuzzy Vault, compared to existing similar technologies, needed fewer attempts.

Study on Rainfall Infiltration Into Vault of Near-surface Disposal Facility Based on Various Disposal Scenarios

  • Kwon, Mijin;Kang, Hyungoo;Cho, Chunhyung
    • 방사성폐기물학회지
    • /
    • 제19권4호
    • /
    • pp.503-515
    • /
    • 2021
  • In this study, rainfall infiltration in vault of the second near-surface disposal facility was evaluated on the basis of various disposal scenarios. A total of four different disposal scenarios were examined based on the locations of the radioactive waste containers. A numerical model was developed using the FEFLOW software and finite element method to simulate the behavior of infiltrated water in each disposal scenario. The effects of the disposal scenarios on the infiltrated water were evaluated by estimating the flux of the infiltrated water at the vault interfaces. For 300 years, the flux of infiltrated water flowing into the vault was estimated to be 1 mm/year or less for all scenario. The overall results suggest that when the engineered barriers are intact, the flux of infiltrated water cannot generate a sufficient pressure head to penetrate the vault. In addition, it is confirmed that the disposal scenarios have insignificant effects on the infiltrated water flowing into the vault.

Feasibility of a New Vault Technique through Kinematic Analysis of Yeo 2 and YANG Hak Seon Vaults

  • Song, Joo-Ho;Park, Jong-Hoon;Kim, Jin-Sun
    • 한국운동역학회지
    • /
    • 제28권2호
    • /
    • pp.69-78
    • /
    • 2018
  • Objective: The purpose of this study was to investigate the feasibility of a new vault technique through a kinematic comparison of the YANG Hak Seon and Yeo 2 vaults. Method: The photographic images of the YANG Hak Seon and Yeo 2 vaults were collected using a high-speed camera, and their kinematic characteristics were analyzed using three-dimensional image analysis. Results: During the post-flight phase of the Yeo 2 and YANG Hak Seon vaults, the time of flight, height of flight, and flight distance were similar. At the peak of the post-flight phase, the trunk rotation angle of the YANG Hak Seon vault rotated $457^{\circ}$ more than did the Yeo 2 vault. During the post-flight descending period, the twist velocity of the trunk was much faster with the YANG Hak Seon vault ($1,278^{\circ}/s$) than with the Yeo 2 vault ($1,016^{\circ}/s$). Conclusion: To succeed in the new technique, the average twist velocity during post-flight must be maintained at $1,058^{\circ}/s$ and the twist velocity must be increased from the ascending phase.

Storage Vault의 열유동 및 상사특성 평가 (Evaluation of Thermal-hydraulic and Scaling Characteristics for Storage Vault)

  • 유승환;방경식;김동희;이관수
    • 방사성폐기물학회지
    • /
    • 제13권2호
    • /
    • pp.131-140
    • /
    • 2015
  • 본 연구에서는 저장볼트(storage vault)의 실험을 위하여 1/4 축소모델 내 튜브의 적정 발열량을 선정하고자 상사해석을 수행하였다. 저장볼트에 대한 열 및 유동 해석을 우선적으로 수행하였고, 크기를 1/4로 축소한 저장볼트에 대하여 동일한 전산해석을 수행하였다. 전산해석 결과를 바탕으로, 제안된 무차원수를 비교하여 원형모델과 온도분포와 유동분포가 유사하게 되는 발열량을 선정하였다. 1/4 축소 저장볼트 내 튜브의 열유속이 1.3배일 때, 원형 저장볼트와 1/4 축소 저장볼트의 온도장 및 유동장이 상사되었다. 이 때, 1/4 축소 저장볼트 내 발열량은 약 190 W이다.

Rationale for Small Glenoid Baseplate: Position of Central Cage within Glenoid Vault (Exactech® Equinoxe® Reverse System)

  • Oh, Joo Han;Lee, Sanghyeon;Rhee, Sung-Min;Jeong, Hyeon Jang;Yoo, Jae Chul
    • Clinics in Shoulder and Elbow
    • /
    • 제22권1호
    • /
    • pp.24-28
    • /
    • 2019
  • Background: Glenoid baseplate location is important to good clinical outcomes of reverse total shoulder arthroplasty (RTSA). The glenoid vault is the determining factor for glenoid baseplate location, but, to date, there are no reports on the effect of central cage location within the glenoid vault on RTSA outcomes when using the $Exactech^{(R)}$ $Equinoxe^{(R)}$ Reverse System. The purpose of this study was to determine the appropriate cage location in relation to the glenoid vault and monitor for vault and/or cortex penetration by the cage. Methods: Data were retrospectively collected from the Samsung Medical Center (SMC) and Seoul National University Bundang Hospital (SNUBH). Patients who underwent RTSA between November 2016 and February 2018 were enrolled. Glenoid vault depth, central cage location within the vault were examined. Inferior glenoid rim-center distance, inferior glenoid rim-cage distance, and center-cage center distances were collected. Results: Twenty-two patients were enrolled. Three SNUBH patients had inappropriate central cage fixation (33.3%) versus 4 SMC patients (30.8%). All cage exposures were superior and posterior to the glenoid vault. Mean center-cage distance was 5.0 mm in the SNUBH group and 5.21 mm in the SMC group. Center-prosthesis distance was significantly longer in the inappropriate fixation group than in the appropriate fixation group (p<0.024). Conclusions: To ensure appropriate glenoid baseplate fixation within the glenoid vault, especially in a small glenoid, the surgeon should place the cage lower than usually targeted, and it should overhang the inferior glenoid rim.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권10호
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.