• Title/Summary/Keyword: A key technique

Search Result 1,745, Processing Time 0.033 seconds

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Development of Key Performance Indicators to Implement Balanced Scorecard to Small and Medium Size Dental Clinic (중소 규모의 치과의원에 균형성과표를 적용하기 위한 핵심성과지표 개발)

  • Kim, Sangsuk;Kim, Myeng Ki;Choi, Hyungkil
    • Korea Journal of Hospital Management
    • /
    • v.22 no.1
    • /
    • pp.40-50
    • /
    • 2017
  • The purpose of this study is to develop the KPIs(Key Performance Indices) needed to improve management and strategy in the dental clinic based on the four perspectives of BSC(Balanced Scorecard). The questionnaire was conducted on 52 dentists approved by Dental Managment Research Committee in Seoul National University as a panel. Using the Delphi technique, the top five KPIs for each point of perspective in BSC were extracted from KPI pools. In the third survey, the top five KPIs of all points were compared with each other through AHP(Analytic Hierarchy Process) method, and priority and overall importance rankings were calculated. The biggest difference in the three level AHP results was the customer perspective took priority to others. In the second survey, the financial perspective, which was number one, was pushed back. The overall significance of KPIs was in the order of customer, internal process, finance, learning and growth perspective, with the exception of medical profits (5th of 20) and new patient growth (10th of 20). We were able to overcome the limitations of the Delphi Technique with the AHP method. In general, the financial perspective in BSC is known to be the most important, but we conclude that the customer perspective is more important through the pairwise comparison survey. In the current dental service market, which is a long-term recession, excessive competition, customer satisfaction and customer relationship management seem to be the first goal to pursue in dental clinic.

QPSK Modulation Based Optical Image Cryptosystem Using Phase-shifting Digital Holography

  • Jeon, Seok-Hee;Gil, Sang-Keun
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • We propose a new technique for the optical encryption of gray-level optical images digitized into 8-bits binary data by ASCII encoding followed by QPSK modulation. We made an encrypted digital hologram with a security key by using 2-step phase-shifting digital holography, and the encrypted digital hologram is recorded on a CCD camera with 256 gray-level quantized intensities. With these encrypted digital holograms, the phase values are reconstructed by the same security key and are decrypted into the original gray-level optical image by demodulation and decoding. Simulation results show that the proposed method can be used for cryptosystems and security systems.

Wind loading characteristics of super-large cooling towers

  • Zhao, L.;Ge, Y.J.
    • Wind and Structures
    • /
    • v.13 no.3
    • /
    • pp.257-273
    • /
    • 2010
  • The aerodynamic and aero-elastic model tests of the China''s highest cooling tower has been carried out in the TJ-3 Boundary Layer Wind Tunnel of Tongji University. By adopting a scanivalve system, the external wind pressure is firstly measured on $12{\times}36$ taps for a single tower, two and four grouped towers under the condition of both smooth flow and the boundary layer due to surrounding geographic and building topography. The measurements of internal wind pressure distribution of $6{\times}36$ taps are taken for a single tower under the various ventilation ratios ranging from 0% to 100% of stuffing layers located at the bottom of the tower. In the last stage, the wind tunnel tests with an aero-elastic model are carefully conducted to determine wind-induced displacements at six levels (each with eight points) with laser displacement sensors. According to the measurement results of wind pressure or vibration response, the extreme aerodynamic loading values of the single or grouped towers are accordingly analyzed based on probability correlation technique.

Imaging Mode Design and Performance Characteristics of the X-band Small SAR Satellite System

  • Kwag, Young-Kil
    • Korean Journal of Remote Sensing
    • /
    • v.16 no.2
    • /
    • pp.157-175
    • /
    • 2000
  • A synthetic aperture radar (SAR) system is able to provide all-weather, day-and- night superior imaging capability of the earth surface, and thus is extremely useful in surveillance for both civil and military applications. In this paper, the X-band high resolution spaceborne SAR system design is demonstrated with the key design performance for a given mission and system requirements characterized by the small satellite system. The SAR multi-mode imaging technique is presented with a critical parameter assessment, and the standard mode results are analyzed in terms of the image quality performances. In line with the system requirement X-band SAR payload and ground reception/processing subsystems are designed and the major design results are presented with the key performance characteristics. This small satellite SAR system shows the wide range of imaging capability with high resolution, and proves to be an effective surveillance systems in the light weight, high performance and cost-effective points of view.

Deriving Key Risk Sub-Clauses for EPC/Turnkey Contract Conditions for Overseas Construction Projects - Based on FIDIC Conditions of Contract for EPC/Turnkey Projects, second edition 2017 - (해외건설공사 EPC/Turnkey 계약조건 핵심 리스크 세부조항 도출 - FIDIC Silver Book 2017년 개정판 기준으로 -)

  • Hong, Seong Yeoll;Jei, Jae Yong;Seo, Sung Chul;Park, Hyung Keun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.6
    • /
    • pp.101-110
    • /
    • 2022
  • Recently, the global construction market is expected to grow at an annual average of 4.8% by 2025 and the risk of overseas construction is also expected to increase accordingly. In particular, domestic construction companies intensively participated in the EPC(Engineering, Procurement, Construction)/Turnkey project, but as a result of failing to respond to contractual risks, they have suffered losses of trillions of won in overseas business since 2013. Nevertheless, there have been not many studies on the derivation of EPC/Turnkey's contractual key risk sub-clauses. Therefore, in this study, the key risk sub-clauses were studied for the conditions of the 2017 Silver Book contract issued by the International Consulting Engineering Federation(FIDIC). To this end, 30 experts with more than 10 years of experience in international construction contracts were formed as a panel to conduct a Delphi survey on 170 sub-clauses of 21 clauses of FIDIC Silver Book to derive 62 main risk sub-clauses. In addition, the RPN(Risk Priority Number) was finally calculated using the FMEA(Failure Mode and Effect Analysis) technique, and 25 key risk sub-clauses within the Critical Risk range were derived. Through the results of this study, the practical point of view is able to refer to the contract provisions to be carefully reviewed at the bidding and contract signing stage in overseas construction projects. From an academic point of view, it provides direction and basic knowledge of how to study the contract fields used in overseas construction EPC/Turnkey projects.

Simulation of stationary Gaussian stochastic wind velocity field

  • Ding, Quanshun;Zhu, Ledong;Xiang, Haifan
    • Wind and Structures
    • /
    • v.9 no.3
    • /
    • pp.231-243
    • /
    • 2006
  • An improvement to the spectral representation algorithm for the simulation of wind velocity fields on large scale structures is proposed in this paper. The method proposed by Deodatis (1996) serves as the basis of the improved algorithm. Firstly, an interpolation approximation is introduced to simplify the computation of the lower triangular matrix with the Cholesky decomposition of the cross-spectral density (CSD) matrix, since each element of the triangular matrix varies continuously with the wind spectra frequency. Fast Fourier Transform (FFT) technique is used to further enhance the efficiency of computation. Secondly, as an alternative spectral representation, the vectors of the triangular matrix in the Deodatis formula are replaced using an appropriate number of eigenvectors with the spectral decomposition of the CSD matrix. Lastly, a turbulent wind velocity field through a vertical plane on a long-span bridge (span-wise) is simulated to illustrate the proposed schemes. It is noted that the proposed schemes require less computer memory and are more efficiently simulated than that obtained using the existing traditional method. Furthermore, the reliability of the interpolation approximation in the simulation of wind velocity field is confirmed.

An Efficient Signing and Certificate Status Management Scheme in Personal PKI (Personal PKI에서 효율적인 서명 및 인증서 상태 검증 기법)

  • Sur Chul;Shin Weon;Lee Kyung-Hyune
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.91-96
    • /
    • 2005
  • Recetly, the term Personal Public Key Infrastructure (PKI) was introduced to supprot reliable and authenticated service in a Personal Area Network (PAN). However, traditional public key signature schemes and certificate status management are not suitable for a PAN environment since mobile devices that constitute the PAN have limited computing capability. In this paper, we propose a new scheme that efficiently provides signature generation and certificate status management for mobile devices. Based on hash chain technique, we intend to reduce computational overhead on signature generation, and further, to minimize communication overhead for managing certificate status.

  • PDF

An amplify-and-forward relaying scheme based on network coding for Deep space communication

  • Guo, Wangmei;Zhang, Junhua;Feng, Guiguo;Zhu, Kaijian;Zhang, Jixiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.670-683
    • /
    • 2016
  • Network coding, as a new technique to improve the throughput, is studied combined with multi-relay model in this paper to address the challenges of long distance and power limit in deep space communication. First, an amplify-and-forward relaying approach based on analog network coding (AFNC) is proposed in multi-relay network to improve the capacity for deep space communication system, where multiple relays are introduced to overcome the long distance link loss. The design of amplification coefficients is mathematically formulated as the optimization problem of maximizing SNR under sum-power constraint over relays. Then for a dual-hop relay network with a single source, the optimal amplification coefficients are derived when the multiple relays introduce non-coherent noise. Through theoretic analysis and simulation, it is shown that our approach can achieve the maximum transmission rate and perform better over single link transmission for deep space communication.

Human Visual System based Automatic Underwater Image Enhancement in NSCT domain

  • Zhou, Yan;Li, Qingwu;Huo, Guanying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.837-856
    • /
    • 2016
  • Underwater image enhancement has received considerable attention in last decades, due to the nature of poor visibility and low contrast of underwater images. In this paper, we propose a new automatic underwater image enhancement algorithm, which combines nonsubsampled contourlet transform (NSCT) domain enhancement techniques with the mechanism of the human visual system (HVS). We apply the multiscale retinex algorithm based on the HVS into NSCT domain in order to eliminate the non-uniform illumination, and adopt the threshold denoising technique to suppress underwater noise. Our proposed algorithm incorporates the luminance masking and contrast masking characteristics of the HVS into NSCT domain to yield the new HVS-based NSCT. Moreover, we define two nonlinear mapping functions. The first one is used to manipulate the HVS-based NSCT contrast coefficients to enhance the edges. The second one is a gain function which modifies the lowpass subband coefficients to adjust the global dynamic range. As a result, our algorithm can achieve contrast enhancement, image denoising and edge sharpening automatically and simultaneously. Experimental results illustrate that our proposed algorithm has better enhancement performance than state-of-the-art algorithms both in subjective evaluation and quantitative assessment. In addition, our algorithm can automatically achieve underwater image enhancement without any parameter tuning.