• Title/Summary/Keyword: weakness layer

Search Result 72, Processing Time 0.028 seconds

Proactive Network Optimizer for Critical Applications (크리티컬한 응용을 위한 능동형 네트워크 최적화기)

  • Park, Bongsang;Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1250-1256
    • /
    • 2018
  • Recently, wireless networks are becoming an important infrastructure for the critical large-scale applications such as cyber-physical systems and next generation industrial automations. However, the fundamental performance uncertainty of wireless networks may incur the serious instability problem of the overall systems. This paper proposes the proactive network optimizer to guarantee the application demands without any real-time link monitoring information of the networks. In particularly, the proposed proactive optimizer is the cross-layer approach to jointly optimize the routing path and traffic distribution in order to guarantee the performance demand within a maximum k number of link faults. Through the simulations, the proposed proactive network optimizer provides better robustness than the traditional existing reactive networks. Furthermore, the proactive network does not expose to the major weakness of the reactive networks such as the performance degradation due to the erroneous link monitoring information and the network reconfiguration cost.

A Study on a Plan for Improving an Unmanned Security System According to Security Threat (복합적 보안위협에 따른 기계경비 개선방안 연구)

  • Kong, Byung Seok;Hwang, Hyun Seok;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.71-76
    • /
    • 2014
  • In modern society, a social economic change is brought about, because time space limitation regarded to be restrictive in times past was overcome owing to its rapid development on the basis of IT technology. The creation of new knowledge became the basis of competitiveness of nations and companies. As competition intensifies among nations and countries in relation to the development of core technology, companies make investment with placing much weight on the development of new technology, but on the other hand, technology leakage incident continuously occurs due to a lack of understanding to protect technology. This is the largest cause of impeding the competitiveness of nations and companies. And now, it is urgent to take security measures against this. Therefore, this paper analyzes institution and system weakness in the physical security area in the integrated security environment, and then identifies all problems about this, and proposes a plan for solving these.

PDA-based Text Extraction System using Client/Server Architecture (Client/Server구조를 이용한 PDA기반의 문자 추출 시스템)

  • Park Anjin;Jung Keechul
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.2
    • /
    • pp.85-98
    • /
    • 2005
  • Recently, a lot of researches about mobile vision using Personal Digital Assistant(PDA) has been attempted. Many CPUs for PDA are integer CPUs, which have no floating-computation component. It results in slow computation of the algorithms peformed by vision system or image processing, which have much floating-computation. In this paper, in order to resolve this weakness, we propose the Client(PDA)/server(PC) architecture which is connected to each other with a wireless LAN, and we construct the system with pipelining processing using two CPUs of the Client(PDA) and the Server(PC) in image sequence. The Client(PDA) extracts tentative text regions using Edge Density(ED). The Server(PC) uses both the Multi-1.aver Perceptron(MLP)-based texture classifier and Connected Component(CC)-based filtering for a definite text extraction based on the Client(PDA)'s tentativel99-y extracted results. The proposed method leads to not only efficient text extraction by using both the MLP and the CC, but also fast running time using Client(PDA)/server(PC) architecture with the pipelining processing.

Grad-CAM based deep learning network for location detection of the main object (주 객체 위치 검출을 위한 Grad-CAM 기반의 딥러닝 네트워크)

  • Kim, Seon-Jin;Lee, Jong-Keun;Kwak, Nae-Jung;Ryu, Sung-Pil;Ahn, Jae-Hyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.204-211
    • /
    • 2020
  • In this paper, we propose an optimal deep learning network architecture for main object location detection through weak supervised learning. The proposed network adds convolution blocks for improving the localization accuracy of the main object through weakly-supervised learning. The additional deep learning network consists of five additional blocks that add a composite product layer based on VGG-16. And the proposed network was trained by the method of weakly-supervised learning that does not require real location information for objects. In addition, Grad-CAM to compensate for the weakness of GAP in CAM, which is one of weak supervised learning methods, was used. The proposed network was tested through the CUB-200-2011 data set, we could obtain 50.13% in top-1 localization error. Also, the proposed network shows higher accuracy in detecting the main object than the existing method.

Finite element modeling of RC columns made of inferior concrete mix strengthened with CFRP sheets

  • Khaled A. Alawi, Al-Sodani;Muhammad Kalimur ,Rahman;Mohammed A., Al-Osta;Omar S. Baghabra, Al-Amoudi
    • Earthquakes and Structures
    • /
    • v.23 no.5
    • /
    • pp.403-417
    • /
    • 2022
  • Reinforced concrete (RC) structures with low-strength RC columns are rampant in several countries, especially those constructed during the early 1960s and 1970s. The weakness of these structures due to overloading or some natural disasters such as earthquakes and building age effects are some of the main reasons to collapse, particularly with the scarcity of data on the impact of aspect ratio and corner radius on the confinement effectiveness. Hence, it is crucial to investigate if these columns (with different aspect ratios) can be made safe by strengthening them with carbon fiber-reinforced polymers (CFRP) sheets. Therefore, experimental and numerical studies of CFRP-strengthened low-strength reinforced concrete short rectangular, square, and circular columns were studied. In this investigation, a total of 6 columns divided into three sets were evaluated. The first set had two circular cross-sectional columns, the second set had two square cross-section columns, and the third set has two rectangular cross-section columns. Furthermore, FEM validation has been conducted for some of the experimental results obtained from the literature. The experimental results revealed that the confinement equations for RC columns as per both CSA and ACI codes could give incorrect results for low-strength concrete. The control specimen (unstrengthened ones) displayed that both ACI and CSA equations overestimate the ultimate strength of low-strength RC columns by order of extent. For strengthened columns with CFRP, the code equations of CSA and ACI code overestimate the maximum strength by around 6 to 13% and 23 to 29%, respectively, depending on the cross-section of the column (i.e., square, rectangular, or circular). Results of finite element models (FEMs) showed that increasing the layer number of new commonly CFRP type (B) from one to 3 for circular columns can increase the column's ultimate loads by around eight times compared to unjacketed columns. However, in the case of strengthened square and rectangular columns with CFRP, the increase of the ultimate loads of columns can reach up to six times and two times, respectively.

FAST : A Log Buffer Scheme with Fully Associative Sector Translation for Efficient FTL in Flash Memory (FAST :플래시 메모리 FTL을 위한 완전연관섹터변환에 기반한 로그 버퍼 기법)

  • Park Dong-Joo;Choi Won-Kyung;Lee Sang-Won
    • The KIPS Transactions:PartA
    • /
    • v.12A no.3 s.93
    • /
    • pp.205-214
    • /
    • 2005
  • Flash memory is at high speed used as storage of personal information utilities, ubiquitous computing environments, mobile phones, electronic goods, etc. This is because flash memory has the characteristics of low electronic power, non-volatile storage, high performance, physical stability, portability, and so on. However, differently from hard disks, it has a weak point that overwrites on already written block of flash memory is impossible to be done. In order to make an overwrite possible, an erase operation on the written block should be performed before the overwrite, which lowers the performance of flash memory highly. In order to solve this problem the flash memory controller maintains a system software module called the flash translation layer(FTL). Of many proposed FTL schemes, the log block buffer scheme is best known so far. This scheme uses a small number of log blocks of flash memory as a write buffer, which reduces the number of erase operations by overwrites, leading to good performance. However, this scheme shows a weakness of low page usability of log blocks. In this paper, we propose an enhanced log block buffer scheme, FAST(Full Associative Sector Translation), which improves the page usability of each log block by fully associating sectors to be written by overwrites to the entire log blocks. We also show that our FAST scheme outperforms the log block buffer scheme.

A STUDY ON THE SAFETY ANALYSIS OF ROCK FILL DAM (2) (필댐의 안정성 해석 연구 (II))

  • HoWoongShon;DaeKeunLee
    • Journal of the Korean Geophysical Society
    • /
    • v.6 no.3
    • /
    • pp.189-207
    • /
    • 2003
  • The purpose of this paper is to analyze the behavior and to study the safety evaluation of the Unmun Dam located in Cheongdo-Gun of GyeongBuk Province, Korea. For this purpose, soil analyses including boring data, geophysical surveys and monitoring the buried geotechnical gauges, such as pore-pressure gauge, earth-pressure gauge, displacement gauge, multi-layer settlement gauge, leakage flow-meter, were conducted. In addition to these data, numerical analyses of behavior of dam were performed to predict and to compare the data which were obtained from the above methods. Since many defects, such as gravel and weathered rock blocks in the dam core, and lots of amounts of leakage, by boring analyses were found, reinforcement by compaction grouting system (CGS) has been conducted in some range of dam. Some geotechnical gauge data were also used to confirm the effects of reinforcement. Analyses of monitoring the data of geotechnical gauges buried in the dam, such as pore-pressure gauge, earth-pressure gauge, displacement gauge, multi-layer settlement gauge, and leakage flow-meter shows the load transfer of dam and the possibility of hydraulic fracturing. As a conclusion, some problems in the dam found. Especially, the dam near spillway shows the high possibility of leakage. It should be pointed out that only the left side of he dam has not a leakage problem. As a whole, the dam has problems of weakness, because of unsatisfactory construction. It is strongly recommended that highly intensive monitoring is required.

  • PDF

The Study on Characteristic Composition of As in a-Se with X-ray Detection Sensor using $CaWO_4/a-Se$ (다층구조($CaWO_4/a-Se$) 기반의 X선 검출센서에서 a-Se에 첨가된 As의 특성비 연구)

  • Choe, Jang-Yong;Lee, Dong-Gil;Sin, Jeong-Uk;Kim, Jae-Hyeong;Nam, Sang-Hee;Park, Ji-Koon;Kang, Sang-Sik;Jang, Gi-Won;Lee, Hung-Won
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.432-435
    • /
    • 2002
  • The ultimate study of this research is to improve the properties of digital X-ray receptor based on amorphous selenium. There are being two prominent studying for Digital Radiography. Direct and Indirect method of Digital Radiography are announced for producing high quality digital image. But each two systems have strength and weakness. This is a basic research for developing of Hybrid digital radiography which is a new type X-ray detector. ln this study, we investigated the electrical characteristic of multi-layer$(CaWO_4+a-Se)$ as a photoconductor according to the changing iodine composition ratio. The iodine composition ratio of a-Se compound is classified into 5 different kinds which have 30ppm, 100ppm, 300ppm, 500ppm, 700ppm and were made test sample throught thermo-evaporation. The phosphor layer of $CaWO_4$ was overlapped on a-Se using EFIRON optical adhesives. We measured the dark and photo current about the test sample and compared the electrical characteristic of the net charge and signal-to-noise ratio. Among other things, test sample of compound material of 700ppm iodine showed good characteristic of $2.53nA/cm^2$ dark current and $479nC/cm^2{\cdot}mR$ net charge at $3V/{\mu}m$.

  • PDF

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

H.264/SVC Spatial Scalability Coding based Terrestrial Multi-channel Hybrid HD Broadcasting Service Framework and Performance Analysis on H.264/SVC (H.264/SVC 공간 계위 부호화 기반 지상파 다채널 하이브리드 고화질 방송 서비스 프레임워크 및 H.264/SVC 부호화 성능 평가)

  • Kim, Dae-Eun;Lee, Bum-Shik;Kim, Mun-Churl;Kim, Byung-Sun;Hahm, Sang-Jin;Lee, Keun-Sik
    • Journal of Broadcast Engineering
    • /
    • v.17 no.4
    • /
    • pp.640-658
    • /
    • 2012
  • One of the existing terrestrial multi-channel DTV service frameworks, called KoreaView, provides four programs, composed of MPEG-2 based one HD video and H.264/AVC based three SD videos within one single 6MHz frequency bandwidth. However the additional 3 SD videos can not provide enough quality due to its reduced spatial resolution and low target bitrates. In this paper, we propose a framework, which is called a terrestrial multi-channel high quality hybrid DTV service, to overcome such a weakness of KoreaView services. In the proposed framework, the three additional SD videos are encoded based on an H.264/SVC Spatial Base layer, which is compliant with H.264/AVC, and are delivered via broadcasting networks. On the other hand, and the corresponding three additional HD videos are encoded based on an H.264/SVC Spatial Enhancement layer, which are transmitted over broadband networks such as Internet, thus allowing the three additional videos for users with better quality of experience. In order to verify the effectiveness of the proposed framework, various experimental results are provided for real video contents being used for DTV services. First, the experimental results show that, when the SD sequences are encoded by the H.264/SVC Spatial Base layer at a target bitrate of 1.5Mbps, the resulting PSNR values are ranged from 34.5dB to 42.9dB, which is a sufficient level of service quality. Also it is noted that 690kbps-8,200kbps are needed for the HD test sequences when they are encoded in the H.264/SVC Spatial Enhancement layer at similar PSNR values for the same HD sequences encoded by MPEG-2 at a target bitrate of 12 Mbps.