• Title/Summary/Keyword: Key Technology Protection

Search Result 324, Processing Time 0.032 seconds

A Survey for the Development of Professional Industrial Technology Protection : Focusing on key status and job path analysis (국내 산업기술보호 전문인력 육성을 위한 실태조사 : 주요 현황 및 직무 경로 분석을 중심으로)

  • Kim Mi Hee;Jung Yu Han
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.107-116
    • /
    • 2023
  • The management of professional manpower with expertise in performing specific tasks can be said to be a very important issue at the national level. Recently, interest in industrial technology protection experts continues to expand, but difficulties are growing due to the lack of policy evidence. Considering these points, this study conducted a fact-finding survey on personnel in charge of industrial technology protection, and through this, quantitative, qualitative, and job path analysis were performed for related job performers. These results are considered to be significant in that they can be used as basic information for fostering industrial technology protection experts in the future.

Image Encryption with The Cross Diffusion of Two Chaotic Maps

  • Jiao, Ge;Peng, Xiaojiang;Duan, Kaiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1064-1079
    • /
    • 2019
  • Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.

Impact response of ultra-high performance fiber-reinforced concrete filled square double-skin steel tubular columns

  • Li, Jie;Wang, Weiqiang;Wu, Chengqing;Liu, Zhongxian;Wu, Pengtao
    • Steel and Composite Structures
    • /
    • v.42 no.3
    • /
    • pp.325-351
    • /
    • 2022
  • This paper studies the lateral impact behavior of ultra-high performance fiber-reinforced concrete (UHPFRC) filled double-skin steel tubular (UHPFRCFDST) columns. The impact force, midspan deflection, and strain histories were recorded. Based on the test results, the influences of drop height, axial load, concrete type, and steel tube wall thickness on the impact resistance of UHPFRCFDST members were analyzed. LS-DYNA software was used to establish a finite element (FE) model of UHPFRC filled steel tubular members. The failure modes and histories of impact force and midspan deflection of specimens were obtained. The simulation results were compared to the test results, which demonstrated the accuracy of the finite element analysis (FEA) model. Finally, the effects of the steel tube thickness, impact energy, type of concrete and impact indenter shape, and void ratio on the lateral impact performances of the UHPFRCFDST columns were analyzed.

Design and Implementation of Serial Key Certification System Using Smartcard (스마트카드를 이용한 시리얼 키 인증 시스템 구현 및 설계)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.473-478
    • /
    • 2007
  • Current certification system use serial key for protect copyright of software and digital contents. But It is not efficient system, because It is not protect copyright through create virtual key or use public key. So we research on various cryptology for prevent illegal copy of serial key, but It is not enough protection of copyright that use software technology only. In this paper, we propose certification system using smart card for protect copyright of software and digital contents.

  • PDF

Discrimination of neutrons and gamma-rays in plastic scintillator based on spiking cortical model

  • Bing-Qi Liu;Hao-Ran Liu;Lan Chang;Yu-Xin Cheng;Zhuo Zuo;Peng Li
    • Nuclear Engineering and Technology
    • /
    • v.55 no.9
    • /
    • pp.3359-3366
    • /
    • 2023
  • In this study, a spiking cortical model (SCM) based n-g discrimination method is proposed. The SCM-based algorithm is compared with three other methods, namely: (i) the pulse-coupled neural network (PCNN), (ii) the charge comparison, and (iii) the zero-crossing. The objective evaluation criteria used for the comparison are the FoM-value and the time consumption of discrimination. Experimental results demonstrated that our proposed method outperforms the other methods significantly with the highest FoM-value. Specifically, the proposed method exhibits a 34.81% improvement compared with the PCNN, a 50.29% improvement compared with the charge comparison, and a 110.02% improvement compared with the zero-crossing. Additionally, the proposed method features the second-fastest discrimination time, where it is 75.67% faster than the PCNN, 70.65% faster than the charge comparison and 38.4% slower than the zero-crossing. Our study also discusses the role and change pattern of each parameter of the SCM to guide the selection process. It concludes that the SCM's outstanding ability to recognize the dynamic information in the pulse signal, improved accuracy when compared to the PCNN, and better computational complexity enables the SCM to exhibit excellent n-γ discrimination performance while consuming less time.

Analysis of Laser-protection Performance of Asymmetric-phase-mask Wavefront-coding Imaging Systems

  • Yangliang, Li;Qing, Ye;Lei, Wang;Hao, Zhang;Yunlong, Wu;Xian'an, Dou;Xiaoquan, Sun
    • Current Optics and Photonics
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Wavefront-coding imaging can achieve high-quality imaging along with a wide range of defocus. In this paper, the anti-laser detection and damage performance of wavefront-coding imaging systems using different asymmetric phase masks are studied, through modeling and simulation. Based on FresnelKirchhoff diffraction theory, the laser-propagation model of the wavefront-coding imaging system is established. The model uses defocus distance rather than wave aberration to characterize the degree of defocus of an imaging system. Then, based on a given defocus range, an optimization method based on Fisher information is used to determine the optimal phase-mask parameters. Finally, the anti-laser detection and damage performance of asymmetric phase masks at different defocus distances and propagation distances are simulated and analyzed. When studying the influence of defocus distance, compared to conventional imaging, the maximum single-pixel receiving power and echo-detection receiving power of asymmetric phase masks are reduced by about one and two orders of magnitude respectively. When exploring the influence of propagation distance, the maximum single-pixel receiving power of asymmetric phase masks decreases by about one order of magnitude and remains stable, and the echodetection receiving power gradually decreases with increasing propagation distance, until it approaches zero.

Total Synthesis of Azasugar 1,4-Dideoxy-1,4-imino-D-galacitol

  • Sadhu, Partha Sarathi;Santhoshi, Amlipur;Rao, Vaidya Jayathirtha
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.11
    • /
    • pp.3554-3558
    • /
    • 2012
  • A new highly stereoselective synthesis of pyrrolidine azasugar 1,4-dideoxy-1,4-imino-D-galacitol is being reported herein. The synthesis was achieved in a linear sequence and inexpensive chiral source (+)-diethyl tartarate was used as the starting material. The key step involved during the synthesis was Pd catalysed amino cyclization of alkenylamine, Bose modified Mitsunobu reaction and Sharpless asymmetric dihydroxylation.

Seismic isolation of nuclear power plant based on layered periodic foundation

  • Mi Zhao;Qun Chen;Junqi Zhang;Xiuli Du
    • Earthquakes and Structures
    • /
    • v.24 no.4
    • /
    • pp.259-274
    • /
    • 2023
  • In this paper, mechanical properties of periodic foundation made of concrete and rubber are investigated by a parametric study using the finite element method (FEM). Periodic foundation is a special type of seismic isolation foundation used in civil engineering, which is inspired by the meso-scale structure of phononic crystals in solid-state physics. This type of foundation is capable of reducing the seismic wave propagating though the foundation, therefore providing additional protection for the structures. In the FEM analysis, layered periodic foundation is frequently modelled due to its simplicity in numerical modeling. However, the isolation effect of periodic foundation on nuclear power plant has not been fully discussed to the best knowledge of authors. In this work, we construct four numerical models of nuclear power plant with different foundations to investigate the seismic isolation effects of periodic foundations. The results show that the layered periodic foundation can increase the natural period of the nuclear power plant like traditional base isolation systems, which is beneficial to the structures. In addition, the seismic response of the nuclear power plant can also be effectively reduced in both vertical and horizontal directions when the frequencies of the incident waves fall into some specific frequency bandgaps of the periodic foundation. Furthermore, it is demonstrated that the layered periodic foundation can reduce the amplitude of the floor response spectrum, which plays an important role in the protection of the equipment.

A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Jung, Chang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.371-378
    • /
    • 2004
  • As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.

Research on the Inter-harmonics Equivalent Impedance of Series Hybrid Active Power Filter

  • Jian-gong, Zhang;Jian-ben, Liu;Shao-jun, Dai;Qiao-fu, Chen;Jun-jia, He
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2062-2069
    • /
    • 2015
  • In the series hybrid active power filter (SHAPF) with magnetic flux compensation (MFC), the system current oscillate in the experimental results when adding the same phase harmonic current command in current control block. This condition endangers the security of the SHAPF. Taking the digit period average arithmetic as example, this paper explains the inter-harmonics current oscillation in the experiment. The conclusion is that the SHAPF is unstable to the inter-harmonics current in theory. Limited by the capacity of the inverter, the system current and the inverter output current do not increase to infinite. At last, some methods are proposed to solve this problem. From the practical viewpoint, the voltage feed-forward control is easy to achieve. It can suppress the current oscillation problems, and also improve the filtering effect. The feasibility of the methods is validated by both the emulation and experiment results.