• Title/Summary/Keyword: intercepted

Search Result 124, Processing Time 0.025 seconds

Study on Implementation of a Digital Frequency Discriminator using 4 channel Delay line (4채널 지연선로를 이용한 디지털 주파수 판별기 구현에 관한 연구)

  • Kook, Chan-Ho;Kwon, Ik-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.512-515
    • /
    • 2010
  • SIGINT(SIGnal INTelligence) includes several parameters intercepted by measurement and analysis of the RF(Radio frequency) signal from free space. One of the important parameters is frequency information. Expecially, in order to perform instantaneous frequency measurement of Radar and Missile seeker's RF signals, we use dedicated RF modules as a DFD(Digital Frequency Discriminator) to provide frequency information by measurement of the relative phase difference between signals via intended RF delay lines. It must measure and provide realtime based frequency information on short pulsed RF signal up to 100 nSec or less. This document proposes Ultra wideband DFD consisted of a RF input section of Wideband 4 channel RF delay line and correlator, a digital processing section to measure and provide frequency information from I/Q signal, and a frequency calibration section. Also, it will show design suitability based on test results measured under test condition of very short input pulse signals.

  • PDF

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.

Response of Cat Shark to the Colored Lights (색광에 대한 두툽상어의 반응)

  • 양용림
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.19 no.1
    • /
    • pp.12-16
    • /
    • 1983
  • The author carried out an experiment to find out the response of cat shark, Scyliorhinus torazame(Tanaka) to the colored lights. The experimental thank (360L$\times$50W$\times$55H cm) was set up in a dark room. Six longitudinal sections with 60cm intervals are marked in the tank to observe th location of the fish. Water depth in the tank was kept 50cm level. Light bulbs of 20W at the both ends of the tank projected the light horizontally into the tank. Two different colored filters were selected from four colors of red, blue, yellow, and white, and they were placed in front of the light bulbs to make different colors of light. Light intensity were controlled by use of auxiliary filters intercepted between the bulb and the filter. The fishes were acclimatized in the dark for 50 minutes before they were employed in the experiment. Upon turning on the light, the number of fish in each section was counted 40 times in 30 second intervals, and the mean of the number of fish in each section was given as the gathering rate of the fish. The favorite color of the fish was found in the order of yellow, white, blue and red in day time, and red, blue, white and yellow at night time. The variation of the gathering rate on illumination time was very little and showed more stability in day time than at night time. The differences of the gathering rates to two selected colors out of the four colors were greater regardless of illumination time.

  • PDF

The scanned point-detecting system for three-dimensional measurement of light emitted from plasplay panel (플라즈마 디스플레이 패널에서 방출되는 광의 3차원 측정을 위한 Scanned Point-Detecting System)

  • 최훈영;이석현;이승걸
    • Korean Journal of Optics and Photonics
    • /
    • v.12 no.2
    • /
    • pp.103-108
    • /
    • 2001
  • In this paper, we designed and made the scanned point detecting system for 3-dimensional measurement of the light emitted from plasma display panel (PDP) , and we measured and analyzed 3-dimensional light emitted from a real PDP by using this scanned point detecting system. The scanned point detecting system has a point detector with a pinhole. The light emitted from the source at the in-focus position can pass through the pinhole and be collected by detector. The light from other sources at outof-focus positions is focused at points in front of or behind the pinhole, and thus it is intercepted by the pinhole. Therefore, we can detect light information from a particular point of a PDP cell of 3-dimensional structure. We know the electric field distribution inside the PDP cell from the 3-dimensionallight intensity distribution measured by using the scanned point detecting system. As the Z axial measurement increases, the intensity of light detected increases and intensity of light detected on the inside edge of the ITa electrode is larger than outside edge of the ITa eletrode and gap of the ITa electrodes. Also, as the measurement point moves from one barrier rib to another, the detected light is weaker near to the barrier ribs than at the center between the barrier ribs. The emitted light is concentrated at the center between barrier ribs. ribs.

  • PDF

Responses of Lactuca Sativa (Lettuce) to Fertilization Rates at Various Soil Moisture Conditions at Protected Cultivation

  • Jung, Kang-Ho;Sonn, Yeon-Kyu;Han, Kyoung-Hwa;Zhang, Yong-Seon
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.48 no.1
    • /
    • pp.50-56
    • /
    • 2015
  • This research was performed to test the hypothesis that the optimal fertilization rate for lettuce is various with soil moisture conditions. The experiment was conducted under a rainfall-intercepted facility in Suwon, South Korea from 2002 to 2003. Soil was irrigated at 30, 50, or 80 kPa of soil moisture tension at 15 cm soil depth in 2002 spring and fall and 20, 30, 50, or 80 kPa in 2003 spring. Fertilization was performed with four levels in spring for both years: none, 0.5, 1.0, and 1.5 times of the recommended N, P, and K fertilization rate. The irrigation amount increased with decreased irrigation starting point as soil moisture tension. The maximum yield was found at the lowest soil moisture tension in spring while irrigation at 50 kPa resulted in the greatest yield in fall. The yield responses of lettuce to fertilization rates were various with soil moisture condition. In spring, maximum yield was found at 1.0 or 1.5 times of the recommended fertilization rate at 20, 30, and 50 kPa irrigation while 0.5 or 1.0 times of fertilization rate resulted in the maximum yield in fall. Especially for 80 kPa irrigation in 2003 spring, yield was decreased by fertilization. It suggested that the optimum fertilization rate for lettuce is affected by soil moisture condition and that lower fertilization rate should be suggested when soil is managed in drier condition.

An Analysis of the Secret Routing Algorithm for Secure Communications (안전한 통신을 위한 비밀 경로 알고리즘의 분석)

  • Yongkeun Bae;Ilyong Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.105-116
    • /
    • 1997
  • Routing security is related to the confidentiality of the route taken by the data transmitted over the network. If the route is detected by the adversary, the probability is higher that the data are lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to the destination node using the shortest path. Furthermore, if we use a number of secret routes from the starting node to the destination node, data security is much stronger since we can transmit partial data rather than the entire data along a secret route. In this paper, the routing algorithm for multiple secret paths on MRNS(Mixed Radix Number System) Network, which requires O(1) for the time complexity where is the number of links on a node, is presented employing the HCLS(Hamiltonian Circuit Latin Square) and is analyzed in terms of entropy.

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.

Seismic response of steel reinforced concrete frame-bent plant of CAP1400 nuclear power plant considering the high-mode vibration

  • Biao Liu;Zhengzhong Wang;Bo Zhang;Ningjun Du;Mingxia Gao;Guoliang Bai
    • Steel and Composite Structures
    • /
    • v.46 no.2
    • /
    • pp.221-236
    • /
    • 2023
  • In order to study the seismic response of the main plant of steel reinforced concrete (SRC) structure of the CAP1400 nuclear power plant under the influence of different high-mode vibration, the 1/7 model structure was manufactured and its dynamic characteristics was tested. Secondly, the finite element model of SRC frame-bent structure was established, the seismic response was analyzed by mode-superposition response spectrum method. Taking the combination result of the 500 vibration modes as the standard, the error of the base reactions, inter-story drift, bending moment and shear of different modes were calculated. Then, based on the results, the influence of high-mode vibration on the seismic response of the SRC frame-bent structure of the main plant was analyzed. The results show that when the 34 vibration modes were intercepted, the mass participation coefficient of the vertical and horizontal vibration mode was above 90%, which can meet the requirements of design code. There is a large error between the seismic response calculated by the 34 and 500 vibration modes, and the error decreases as the number of modes increases. When 60 modes were selected, the error can be reduced to about 1%. The error of the maximum bottom moment of the bottom column appeared in the position of the bent column. Finally, according to the characteristics of the seismic influence coefficient αj of each mode, the mode contribution coefficient γj•Xji was defined to reflect the contribution of each mode to the seismic action.

Pipeline defect detection with depth identification using PZT array and time-reversal method

  • Yang Xu;Mingzhang Luo;Guofeng Du
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.253-266
    • /
    • 2023
  • The time-reversal method is employed to improve the ability of pipeline defect detection, and a new approach of identifying the pipeline defect depth is proposed in this research. When the L(0,2) mode ultrasonic guided wave excited through a lead zirconate titinate (PZT) transduce array propagates along the pipeline with a defect, it will interact with the defect and be partially converted to flexural F(n, m) modes and longitudinal L(0,1) mode. Using a receiving PZT array attached axisymmetrically around the pipeline, the L(0,2) reflection signal as well as the mode conversion signals at the defect are obtained. An appropriate rectangle window is used to intercept the L(0,2) reflection signal and the mode conversion signals from the obtained direct detection signals. The intercepted signals are time reversed and re-excited in the pipeline again, result in the guided wave energy focusing on the pipeline defect, the L(0,2) reflection and the L(0,1) mode conversion signals being enhanced to a higher level, especially for the small defect in the early crack stage. Besides the L(0,2) reflection signal, the L(0,1) mode conversion signal also contains useful pipeline defect information. It is possible to identify the pipeline defect depth by monitoring the variation trend of L(0,2) and L(0,1) reflection coefficients. The finite element method (FEM) simulation and experiment results are given in the paper, the enhancement of pipeline defect reflection signals by time-reversal method is obvious, and the way to identify pipeline defect depth is demonstrated to be effective.

Changes in Radiation Use Efficiency of Rice Canopies under Different Nitrogen Nutrition Status (질소영양 상태에 따른 벼 군락의 광 이용효율 변화)

  • Lee Dong-Yun;Kim Min-Ho;Lee Kyu-Jong;Lee Byun-Woo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.3
    • /
    • pp.190-198
    • /
    • 2006
  • Radiation use efficiency (RUE), the amount of biomass produced per unit intercepted photosynthetically active radiation (PAR), constitutes a main part of crop growth simulation models. The objective of the present study was to evaluate the variation of RUE of rice plants under various nitrogen nutritive conditions. from 1998 to 2000, shoot dry weight (DW), intercepted PAR of rice canopies, and nitrogen nutritive status were measured in various nitrogen fertilization regimes using japonica and Tongil-type varieties. These data were used for estimating the average RUEs before heading and the relationship between RUE and the nitrogen nutritive status. The canopy extinction coefficient (K) increased with the growth of rice until maximum tillering stage and maintained constant at about 0.4 from maximum tillering to heading stage, rapidly increasing again after heading stage. The DW growth revealed significant linear correlation with the cumulative PAR interception of the canopy, enabling the estimation of the average RUE before heading with the slopes of the regression lines. Average RUE tended to increase with the increased level of nitrogen fertilization. RUE increased approaching maximum as the nitrogen nutrition index (NNI) calculated by the ratio of actual shoot N concentration to the critical N concentration for the maximum growth at any growth stage and the specific leaf nitrogen $(SLN;\;g/m^2\;leaf\;area)$ increased. This relationship between RUE (g/MJ of PAR) and N nutritive status was expressed well by the following exponential functions: $$RUE=3.13\{1-exp(-4.33NNNI+1.26)\}$$ $$RUE=3.17\{1-exp(-1.33SLN+0.04)\}$$ The above equations explained, respectively, about 80% and 75% of the average RUE variation due to varying nitrogen nutritive status of rice plants. However, these equations would have some limitations if incorporated as a component model to simulate the rice growth as they are based on relationships averaged over the entire growth period before heading.