• Title/Summary/Keyword: Key Generation

Search Result 1,476, Processing Time 0.031 seconds

Stochastic Channel Modeling for Railway Tunnel Scenarios at 25 GHz

  • He, Danping;Ai, Bo;Guan, Ke;Zhong, Zhangdui;Hui, Bing;Kim, Junhyeong;Chung, Heesang;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.39-50
    • /
    • 2018
  • More people prefer using rail traffic for travel or for commuting owing to its convenience and flexibility. The railway scenario has become an important communication scenario in the fifth generation era. The communication system should be designed to support high-data-rate demands with seamless connectivity at a high mobility. In this paper, the channel characteristics are studied and modeled for the railway tunnel scenario with straight and curved route shapes. On the basis of measurements using the "Mobile Hotspot Network" system, a three-dimensional ray tracer (RT) is calibrated and validated for the target scenarios. More channel characteristics are explored via RT simulations at 25.25 GHz with a 500-MHz bandwidth. The key channel parameters are extracted, provided, and incorporated into a 3rd-Generation-Partnership-Project-like stochastic channel generator. The necessary channel information can be practically realized, which can support the link-level and system-level design of the communication system in similar scenarios.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P.;Bose, S.;Kannan, A.;Jegatha Deborah, L.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.878-894
    • /
    • 2013
  • Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

Space Charge Behavior of Oil-paper Insulation Thermally Aged under Different Temperatures and Moistures

  • Zhou, Yuan-Xiang;Huang, Meng;Chen, Wei-Jiang;Jin, Fu-Bao
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1124-1130
    • /
    • 2015
  • Moisture and high temperature are the most important factors that lead to the ageing of oil-paper insulation, but the research about space charge characteristics of oil-paper insulation does not take the combined effect of ambient temperature, moisture and thermal ageing into account. The pulsed electroacoustic (PEA) method was used to investigate the influence of moisture and temperature on space charge characteristics of oil paper at different ageing stages. The results showed that moisture could speed up formation of space charge in oil paper when water concentration was low, but the formation was restrained if the water concentration was high. At the beginning of thermal ageing, heterogeneous charge accumulation had predominance, but it gradually changed to homogeneous charge injection with ageing. It was believed that moisture concentration could speed up ageing and enhance charge accumulation on one hand, and accelerate or slow down the establishment speed of space charge on the other hand, therefore, charge accumulation type changed with ageing. The more seriously the oil-paper insulation was thermally aged, the deeper the trap energy level was, hence more space charge was trapped, which could be speeded up by increasing the ageing temperature, but the effect of ambient temperature did not fit the Arrhenius law.

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

Generating Radiology Reports via Multi-feature Optimization Transformer

  • Rui Wang;Rong Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2768-2787
    • /
    • 2023
  • As an important research direction of the application of computer science in the medical field, the automatic generation technology of radiology report has attracted wide attention in the academic community. Because the proportion of normal regions in radiology images is much larger than that of abnormal regions, words describing diseases are often masked by other words, resulting in significant feature loss during the calculation process, which affects the quality of generated reports. In addition, the huge difference between visual features and semantic features causes traditional multi-modal fusion method to fail to generate long narrative structures consisting of multiple sentences, which are required for medical reports. To address these challenges, we propose a multi-feature optimization Transformer (MFOT) for generating radiology reports. In detail, a multi-dimensional mapping attention (MDMA) module is designed to encode the visual grid features from different dimensions to reduce the loss of primary features in the encoding process; a feature pre-fusion (FP) module is constructed to enhance the interaction ability between multi-modal features, so as to generate a reasonably structured radiology report; a detail enhanced attention (DEA) module is proposed to enhance the extraction and utilization of key features and reduce the loss of key features. In conclusion, we evaluate the performance of our proposed model against prevailing mainstream models by utilizing widely-recognized radiology report datasets, namely IU X-Ray and MIMIC-CXR. The experimental outcomes demonstrate that our model achieves SOTA performance on both datasets, compared with the base model, the average improvement of six key indicators is 19.9% and 18.0% respectively. These findings substantiate the efficacy of our model in the domain of automated radiology report generation.

A Study on the Participation of Virtual Power Plant Based Technology Utilizing Distributed Generation Resources in Electricity Market (분산발전자원을 활용한 가상발전소 기반 기술의 전력시장 참여 방안에 대한 연구)

  • Lee, Yun-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.2
    • /
    • pp.94-100
    • /
    • 2016
  • A virtual power plant (VPP) technology is a cluster of distributed generation installations. VPP system is that integrates several types of distributed generation sources, so as to give a reliable overall power supply. Virtual power plant systems play a key role in the smart grids concept and the move towards alternative sources of energy. They ensure improved integration of the renewable energy generation into the grids and the electricity market. VPPs not only deal with the supply side, but also help manage demand and ensure reliability of grid functions through demand response (DR) and other load shifting approaches in real time. In this paper, utilizing a variety of distributed generation resources(such as emergency generator, commercial generator, energy storage device), activation scheme of the virtual power plant technology. In addition, through the analysis of the domestic electricity market, it describes a scheme that can be a virtual power plant to participate in electricity market. It attempts to derive the policy support recommendation in order to obtain the basics to the prepared in position of power generation companies for the commercialization of virtual power plant.

Heuristic Procedure on General n/m Job-Shop Scheduling Generation

  • Won, Chin Hee;Kim, Man Shik
    • Journal of Korean Society for Quality Management
    • /
    • v.16 no.1
    • /
    • pp.32-42
    • /
    • 1988
  • The general n/m job-shop problem is easy to state what is required, but it is extremely difficult to make any progress whatever toward a solution. This paper was first to examine a heuristic procedure of general n/m scheduling generation focused on the procedure of MWRK (Most Work Remaining) presented by Giffler and Thompson (1960) among others. Then modified procedure was proposed to obtain better solution in light of the key measure of performance compared with that of the literature presented by Baker (1974). The modified procedure then has been extended to other example problem to test the better results and to assure the properness of application.

  • PDF

Subgoal Generation Algorithm for Effective Composition of Path-Planning

  • Kim, Chan-Hoi;Park, Jong-Koo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1496-1499
    • /
    • 2004
  • In this paper, we deal with a novel path planning algorithm to find collision-free path for a moving robot to find an appropriate path from initial position to goal position. The robot should make progress by avoiding obstacles located at unknown position. Such problem is called the path planning. We propose so called the subgoal generation algorithm to find an effective collision-free path. The generation and selection of the subgoal are the key point of this algorithm. Several subgoals, if necessary, are generated by analyzing the map information. The subgoal is the candidate for the final path to be pass through. Then selection algorithm is executed to choose appropriate subgoal to construct a correct path. Deep and through explanations are given for the proposed algorithm. Simulation example is given to show the effectiveness of the proposed algorithm.

  • PDF

A New Probabilistic Generation Simulation Considering Hydro, Pumped-Storage Plants and Multi-Model (수력,양수 및 다중모델을 고려한 새로운 확률론적 발전시뮬레이션)

  • 송길영;최재석
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.40 no.6
    • /
    • pp.551-561
    • /
    • 1991
  • The probabilistic generation simulation plays a key role in power system expansion and operational planning especially for the calculation of expected energy, loss of load probaility and unserved energy expected. However, it is crucial to develop a probabilistic generation simulation algorithm which gives sufficiently precise results within a reasonable computation time. In a previous paper, we have proposed an efficent method using Fast Hartley Transform in convolution process for considering the thermal and nuclear units. In this paper, a method considering the scheduling of pumped-storage plants and hydro plants with energy constraint is proposed. The method also adopts FHT techniques. We improve the model to include multi-state and multi-block generation. The method has been applied for a real size model system.

  • PDF