• Title/Summary/Keyword: 메커니즘 생성

Search Result 611, Processing Time 0.027 seconds

Security Mechanism of Agent for Effective Agro-Foods Mobile Commerce (농산물 모바일 상거래를 위한 효과적인 에이전트 보안 메커니즘)

  • Jung Chang-Ryul;Song Jin-Kook;Koh Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1573-1581
    • /
    • 2006
  • To utilize actively the agent which is one of the elements of revitalization of Agro-Foods Mobile I-commerce, an essential prerequisite is agent security. IF using partial PKI(Public Key Infrastructure)-based confirmation mechanism providing security for the agent, the size of agent is becoming larger, the result of the transmission speed is slow, and the confirmation speed is tardy as well because of performing calculation of public keys such as RSA and needing linkage with the CA for the valid examination of certificates. This paper suggests a mechanism that can cross certification and data encryption of each host in the side of improving the problems of key distribution on agent by shaping key chain relationship. This mechanism can guarantee the problem of ky distribution by using agent cipher key(ACK) module and generating random number to fit mobile surroundings and to keep the secret of the agent. Suggested mechanism is a thing that takes into consideration security and efficiency to secure agent for the revitalization of M-Commerce, and is a code skill to make the agent solid and is a safe mechanism minimizing the problems of memory overflow.

Numerical analysis on performances and emission characteristics of HCCI engine fueled with hydrogen added biogas (반응 메커니즘 기반의 수소 첨가 바이오가스 HCCI 엔진 성능 및 배출가스에 대한 수치 해석적 연구)

  • Park, Jungsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.41-46
    • /
    • 2018
  • In this research, numerical analysis was performed to determine the effects of hydrogen on biogas combustion for homogeneous charged compression ignition (HCCI) engines. The target engine specifications were a 2300cc displacement volume, 13:1 compression ratio, 15kW of electricity, and 1.2 bar boost pressure. The engine speed was fixed to 1800rpm. By varying the excess air ratio and hydrogen contents, the cylinder pressure, nitric oxide, and carbon dioxide were measured as a function of the hydrogen contents. According to preliminary studies related to the reaction mechanism for methane combustion and oxidation, a GRI 3.0 mechanism as the base mechanism was selected for HCCI combustion calculations describing the detailed reaction mechanism. By adding hydrogen, NO was increased while $CO_2$ was decreased. The cylinder pressure was also increased, having advanced timing for the maximum cylinder pressure and pressure rise region. Furthermore, lean operation limits were extended by adding hydrogen to the HCCI engine.

Lightweight IP Traceback Mechanism on IPv6 Network Environment (IPv6 네트워크 환경에서의 경량화된 IP 역추적 기법)

  • Heo, Joon;Kang, Myung-Soo;Hong, Choong-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.93-102
    • /
    • 2007
  • A serious problem to fight DDoS attacks is that attackers use incorrect or spoofed IP addresses in the attack packets. Due to the stateless nature of the internet, it is a difficult problem to determine the source of these spoofed IP packets. The most of previous studies to prevent and correspond to DDoS attacks using the traceback mechanism have been accomplished in IPv4 environment. Even though a few studies in IPv6 environment were introduced, those have no detailed mechanism to cope with DDoS attacks. The mechanisms for tracing the origin of attacks in IPv6 networks have so many differences from those of IPv4 networks. In this paper we proposed a lightweight IP traceback mechanism in IPv6 network environment. When marking for traceback is needed, the router can generate Hop-by-Hop option and transmit the marked packet. We measured the performance of this mechanism and at the same time meeting the efficient marking for traceback.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Tracking Propagation Mechanism on the Surface of Polyvinyl-Chloride-Sheathed Flat Cord based on Electric Field Analysis and Gas Discharge Physics (전계해석과 기체방전 이론을 기반으로 한 Polyvinyl-Chloride-Sheathed Flat Cord 표면의 트래킹 진전 메커니즘)

  • Lim, Dong-Young;Park, Herie;Jee, Seung-Wook
    • Fire Science and Engineering
    • /
    • v.33 no.2
    • /
    • pp.30-38
    • /
    • 2019
  • Tracking, which is one of the main causes of electrical fires, is perceived as a physical phenomenon of electrical discharge. Hence tracking should be explained based on electric field analysis, conduction path by electron generation, and gas discharge physics. However, few papers have considered these details. This paper proposes a tracking mechanism including their effects on tracking progress. In order to prove this mechanism, a tracking experiment, an electric field analysis for the carbonization evolution model, and an explanation of the tracking process by gas discharge physics were conducted. From the tracking experiment, the current waveforms were measured at each stage of the tracking progress from corona discharge to tracking breakdown. The electric field analysis was carried out in order to determine the electric field on the surface of a dry-band and the high electric field region for electron generation during the generation and progress of carbonization. In this paper, the proposed tracking mechanism consisted of six stages including electron avalanche by corona discharge, accumulation of positive ions, expansion of electron avalanche, secondary electron emission avalanche, streamer, and tracking by conductive path. The pulse current waveforms measured in the tracking experiment can be explained by the proposed tracking mechanism. The results of this study will be used as the technical data to detect tracking phenomenon, which is the cause of electric fire, and to improve the proof tracking index.

A Study on Particle Size Distribution at High Pressure (고압에서 입자크기 분포 연구)

  • Ku, Hee-Kwon;Park, Byung-Gi;Kim, Jong-Yung;Jeong, Eun-Sun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.11a
    • /
    • pp.347-349
    • /
    • 2008
  • 발전소 물/증기 순환계통의 주요 기기인 증기발생기/보일러는 금속산화물과 각종 불순물이 축적되면 전열관이 손상되므로, 증기발생기/보일러 내부로 최소의 슬러지가 유입되고, 증기발생기 내부에서 금속산화물 입자가 형성되는 것을 억제하기 위해 수질관리를 하고 있으며, 증기발생기 내부에 존재하는 슬러지를 배출하기 위해 Blowdown 및 Sludge Lancing 등의 물리적 방법을 이용하는 기술이 개발되어 있다. 그러나 이러한 관리에도 불구하고 슬러지 성분인 금속산화물 농도는 운전 조건에 따라 매우 다르며(불순물 잠복 및 방출 현상), 아직까지 잠복현상에 대한 기본적인 메커니즘은 완전히 규명되고 있지 않다. 본 연구에서는 물/증기 순환계통 부식생성물의 물성 평가를 하기 위해 순환계통 기기들과 배관 부식생성물의 대부분인 철분이 부식에 가장 큰 영향을 미치기 때문에, 수화학 조건 및 금속합금 종류에 따라 생성되는 부식생성물을 철분을 중심으로 하여 실험하였고, 또한 부식생성물은 온도에 의해서도 영향을 많이 받기 때문에 다양한 온도에서도 부식생성물 생성 실험을 하였다.

  • PDF

Strength Development and Hardening Mechanism of Alkali Activated Fly Ash Mortar (알카리 활성화에 의한 플라이애쉬 모르타르의 강도 발현 및 경화 메커니즘)

  • Jo, Byung-Wan;Park, Min-Seok;Park, Seung-Kook
    • Journal of the Korea Concrete Institute
    • /
    • v.18 no.4 s.94
    • /
    • pp.449-458
    • /
    • 2006
  • The discharge of fly ash that is produced by coal-fired electric power plants is rapidly increasing in Korea. The utilization of fly ash in the raw materials would contribute to the elimination of an environmental problem and to the development of new high-performance materials. So it is needed to study the binder obtained by chemically activation of pozzolanic materials by means of a substitute for the cement. Fly ash consists of a glass phase. As it is produced from high temperature, it is a chemically stable material. Fly ash mostly consists of $SiO_2\;and\;Al_2O_3$, and it assumes the form of an oxide in the inside of fly ash. Because this reaction has not broken out by itself, it is need to supply it with additional $OH^-$ through alkali activators. Alkali activators were used for supplying it with additional $OH^-$. This paper concentrated on the strength development according to the kind of chemical activators, the curing temperature, the heat curing time. Also, according to scanning electron microscopy and X-Ray diffraction, the main reaction product in the alkali activated fly ash mortar is Zeolite of $Na_6-(AlO_2)_6-(SiO_2)_{10}-12H_2O$ type.

A Design and Implementation of Access Control Mechanism for Secure Downgrading of Objects (객체의 안전한 보안등급의 하강을 위한 접근통제 메커니즘의 설계 및 구현)

  • Park, Chun-Gu;Shin, Wook;Kang, Jung-Min;Lee, Dong-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.281-286
    • /
    • 2001
  • 다중등급보안(MLS: Multi-Level Security)기반 안전한 운영체제는 정보의 흐름을 안전하게 통제하기 위하여 주체 및 객체의 보안등급변화를 허용하지 않는다. 하지만 안전한 운영체제의 사용성(Usability) 측면에서 주체 및 객체의 보안등급변화는 고려되어야한다. 주체 및 객체의 보안등급변화에 관련된 요구사항은 시스템의 환경 및 보안정책에 따라 다양하게 발생할 수 있고, 이러한 보안등급변화에 관련된 다양한 요구사항들은 모두 해결하기 어렵다. 뿐만 아니라, 기존 접근통제 메커니즘은 보안등급변화에 관련된 요구사항을 해결할 수 없다. 따라서, 본 논문에서는 MLS 기반 안전한 운영체제에서 빈번하게 발생할 수 있는 보안등급 변화에 관련된 요구사항 중 특히, 시스템의 환경에 의해 주체의 보안등급이 하강되었을 때 해당 주체가 생성했던 객체들의 안전한 보안등급 하강과 관련된 보안요구사항을 해결할 수 있는 접근통제 메커니즘을 설계하고 구현한다.

  • PDF

The energy efficient traffic control mechanism in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 트래픽 제어 메커니즘)

  • Jang, Yong-Jae;Park, Kyung-Yuk;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2257-2264
    • /
    • 2011
  • Sensor nodes in Wireless sensor network have limited resources and consume almost all energy to the communication. For its traffic feature as a burst traffic type toward a sink node, it has high probability to network congestion. Network congestion causes packet drops and retransmission of dropped packets draws energy consumption. In particular, the loss of packet that is from the sensor node far away from a sink node requires additional energy consumption by frequent retransmission. This paper presents a traffic control mechanism that determines packet transfer by considering priority of packet and congestion level as well as hop count. Analysis of proposed mechanism by simulation demonstrated that it improved energy efficiency.

A Mechanism for Fast Detection of Knowledge Source Activations (활성 지식 원천들의 신속한 탐지를 위한 메커니즘)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.888-894
    • /
    • 2011
  • Blackboard architecture was designed as a means for dealing with ill-defined and complex problems. In order to improve the efficiency of the systems using blackboard architecture, this paper proposes a mechanism for fast detection of knowledge source activations which can contribute potentially to the problem solving of blackboard systems, whenever the state of blackboard is changed. The proposed mechanism uses a Rete network generated from the activation conditions subscribed by all knowledge sources to process the pattern matching between blackboard data and the activation conditions efficiently.