• Title/Summary/Keyword: Leakage verification

Search Result 124, Processing Time 0.032 seconds

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

Review of Aging Management for Concrete Silo Dry Storage Systems

  • Donghee Lee;Sunghwan Chung;Yongdeog Kim;Taehyung Na
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.21 no.4
    • /
    • pp.531-541
    • /
    • 2023
  • The Wolsong Nuclear Power Plant (NPP) operates an on-site spent fuel dry storage facility using concrete silo and vertical module systems. This facility must be safely maintained until the spent nuclear fuel (SNF) is transferred to an external interim or final disposal facility, aligning with national policies on spent nuclear fuel management. The concrete silo system, operational since 1992, requires an aging management review for its long-term operation and potential license renewal. This involves comparing aging management programs of different dry storage systems against the U.S. NRC's guidelines for license renewal of spent nuclear fuel dry storage facilities and the U.S. DOE's program for long-term storage. Based on this comparison, a specific aging management program for the silo system was developed. Furthermore, the facility's current practices-periodic checks of surface dose rate, contamination, weld integrity, leakage, surface and groundwater, cumulative dose, and concrete structure-were evaluated for their suitability in managing the silo system's aging. Based on this review, several improvements were proposed.

Necessity of Standardization and Standardized Method for Substances Accounting of Environmental Liability Insurance (환경책임보험 배출 물질 정산의 표준화 필요성 및 산출방법 표준화)

  • Park, Myeongnam;Kim, Chang-wan;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.5
    • /
    • pp.1-17
    • /
    • 2018
  • Related incidents and accidents are frequent after 2000 years, such as the outbreak of the Taian peninsula crude oil spillage and Gumi hydrofluoric acid leakage accident. In the wake of such environmental pollution accidents, Consensus has been formed to enact legislation on liability for the compensation of environmental pollution in 2014 and the rescue, and has been in force since January 2016. Therefore, in the domestic insurance industry, the introduced environmental liability insurance system needs to be managed through the standardization formula of a new insurance model for managing the environmental risk. This study has been carried out by the emergence of a safe insurance model with a risky nature of the risk type, which is one of the services of the knowledge base. The verification of the six assurance media on the occurrence of environmental pollution such as chemical, waste, marine, soil, etc. is expressed through semantic interoperability through this possible ontology. The insurance model was designed and presented by deducing the relationship between the amount of money and the amount of money that was written in the area of existing expertise, In order to exclude the possible consequences, the concept of abstract is conceptualized in the form of a customer, and a plan for the future development of an ontology-based decision support system is proposed to reduce the cost and resources consumed every year. It is expected that standardization of the verification standard of the mass of mass will minimize errors and reduce the time and resources required for verification.

Design of a New Balanced Power Amplifier Utilizing the Reflected Input Power (입력단 반사전력을 이용하는 새로운 구조의 평형전력증폭기 설계)

  • Park, Chun-Seon;Lim, Jong-Sik;Cha, Hyeon-Won;Han, Sang-Min;Ahn, Dal
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.5
    • /
    • pp.947-954
    • /
    • 2009
  • This paper proposed a new balanced power amplifier using the reflected input of conventional balanced power amplifiers composed of branch line hybrid coupler. In general, the single-ended amplifier in balanced amplifiers does not have the perfect matching, so the reflected input power, in other words the leakage power, is terminated conventionally at the isolation port of hybrid coupler. However in this work, the leakage power is injected into the auxiliary amplifier, and its output power is combined to the output power of balanced amplifier. Therefore output power, efficiency, and 2-tone IMD3 performances of the proposed balanced amplifier are highly improved compared to the conventional balanced amplifier. For the verification of the proposed balanced amplifier, a conventional balanced amplifier and the proposed balanced amplifier are designed, fabricated and measured, and the measured results are compared. The proposed balanced amplifier shows the improvement in the output power(Pout), power added efficiency (PAE), and 2-tone IMD3 by 3dB, 5.2%, and $5{\sim}10dBc$, respectively, from the measurement.

Design of a radiation-tolerant I-gate n-MOSFET structure and analysis of its characteristic (I 형 게이트 내방사선 n-MOSFET 구조 설계 및 특성분석)

  • Lee, Min-woong;Cho, Seong-ik;Lee, Nam-ho;Jeong, Sang-hun;Kim, Sung-mi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1927-1934
    • /
    • 2016
  • In this paper, we proposed a I-gate n-MOSFET (n-type Metal Oxide Semiconductors Field Effect Transistor) structure in order to mitigate a radiation-induced leakage current path in an isolation oxide interface of a silicon-based standard n-MOSFET. The proposed I-gate n-MOSFET structure was designed by using a layout modification technology in the standard 0.18um CMOS (Complementary Metal Oxide Semiconductor) process, this structure supplements the structural drawbacks of conventional radiation-tolerant electronic device using layout modification technology such as an ELT (Enclosed Layout Transistor) and a DGA (Dummy Gate-Assisted) n-MOSFET. Thus, in comparison with the conventional structures, it can ensure expandability of a circuit design in a semiconductor-chip fabrication. Also for verification of a radiation-tolerant characteristic, we carried out M&S (Modeling and Simulation) using TCAD 3D (Technology Computer Aided Design 3-dimension) tool. As a results, we had confirmed the radiation-tolerant characteristic of the I-gate n-MOSFET structure.

A Study on Improvement of Modular Specifications - Focused on technical specifying method in waterproof and mechanical works - (모듈러 공사시방서 개선방안에 관한 연구 - 방수 및 기계설비공사의 기술방안 개선을 중심으로 -)

  • Yoon, Jongsik;Shin, Dongwoo;Cha, Heesung;Kim, Kyungrai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.3
    • /
    • pp.33-41
    • /
    • 2017
  • A modular specification is a contract document that specifies the requirements of production, transformation and installation in a modular construction. A problem of the currently used specification is that it does not guarantee the level of performance required by the modular construction and fails to accommodate unique characteristics of each construction because it widely uses the standard specification as it is. This study proposes a specification that reflects the unique feature of modular construction in order to improve the quality of modular construction. Research focuses on the leakage in waterproof and mechanical equipment because it is the area with the highest rate of defects. This study suggests ways to improve the modular specification as follows: 1)Descriptive specifying (following MasterFormat) 2)Propose leakage verification method and test clause 3) Reflect characteristic of modular construction. Proposed modifications to modular specification are reviewed by experts for validation and their opinion verifies suggested improvements as a way to secure the quality of modular construction and to promise characteristics of the modular specification. This improvement will be used for reference when writing construction project specification, which can be an important contract document, so that it could lower occurrence rate of the modular defects.

Development of Radiation Shielding Analysis Program Using Discrete Elements Method in X-Y Geometry (2차원 직각좌표계에서 DEM을 이용한 방사선차폐해석 프로그램개발)

  • Park, Ho-Sin;Kim, Jong-Kyung
    • Nuclear Engineering and Technology
    • /
    • v.25 no.1
    • /
    • pp.51-62
    • /
    • 1993
  • A computational program [TDET] of the particle transport equation is developed on radiation shielding problem in two-dimensional cartesian geometry based on the discrete element method. Not like the ordinary discrete ordinates method, the quadrature set of angles is not fixed but steered by the spatially dependent angular fluxes. The angular dependence of the scattering source term in the particle transport equation is described by series expansion in spherical harmonics, and the energy dependence of the particles is considered as well. Three different benchmark tests are made for verification of TDET : For the ray effect analysis on a square absorber with a flat isotropic source, the results of TDET calculation are quite well conformed to those of MORSE-CG calculation while TDET ameliorates the ray effect more effectively than S$_{N}$ calculation. In the analysis of the streaming leakage through a narrow vacuum duct in a shield, TDET shows conspicuous and remarkable results of streaming leakage through the duct as well as MORSE-CG does, and quite better than S$_{N}$ calculation. In a realistic reactor shielding situation which treats in two cases of the isotropic scattering and of linearly anisotropic scattering with two groups of energy, TDET calculations show local ray effect between neighboring meshes compared with S$_{N}$ calculations in which the ray effect extends broadly over several meshes.eshes.

  • PDF

A Study on the Development and the Verification Experiment of ECDA Equipment (외면부식직접평가 장비 개발 및 실증 시험에 관한 연구)

  • Ryou, Young-Don;Lee, Jin-Han;Jung, Sung-Won;Park, Kyeong-Wan
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.5
    • /
    • pp.72-81
    • /
    • 2016
  • When the coatings of buried steel pipelines are damaged, corrosion could be occurred on the surface of the damaged areas. Moreover the pinhole occurred by corrosion of pipelines may cause accidents due to gas leakage. To prevent these accidents, foreign countries including UK and USA have carried out coating defect detection on the buried gas pipelines by using a DCVG or a ACVG and have conducted direct assessment of pipelines through digging the ground, and if necessary, have repaired the pipelines. That is called ECDA i.e External Corrosion Direct Assessment which is regulated by NACE standards(SP 0502) and etc. In Korea, the ECDA provisions were included in KGS FS551 in 2014 when the regulations of Safety Validation in Detail for the medium-pressure piping were introduced. We have developed the equipment which can be used to detect external corrosion of the buried gas pipelines. We have also constructed pipeline test bed for empirical test of the developed equipment. In addition, we have carried out the verification experiments of the developed equipment on the test bed to demonstrate the performance of the equipment. The experiments were conducted by comparison tests of the developed equipment and other equipments which have been introduced and used in Korea. As the result, we have found the developed equipment is easier to use and has far superior performance compared to other equipment being used in Korea.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Improved Performance of Image Semantic Segmentation using NASNet (NASNet을 이용한 이미지 시맨틱 분할 성능 개선)

  • Kim, Hyoung Seok;Yoo, Kee-Youn;Kim, Lae Hyun
    • Korean Chemical Engineering Research
    • /
    • v.57 no.2
    • /
    • pp.274-282
    • /
    • 2019
  • In recent years, big data analysis has been expanded to include automatic control through reinforcement learning as well as prediction through modeling. Research on the utilization of image data is actively carried out in various industrial fields such as chemical, manufacturing, agriculture, and bio-industry. In this paper, we applied NASNet, which is an AutoML reinforced learning algorithm, to DeepU-Net neural network that modified U-Net to improve image semantic segmentation performance. We used BRATS2015 MRI data for performance verification. Simulation results show that DeepU-Net has more performance than the U-Net neural network. In order to improve the image segmentation performance, remove dropouts that are typically applied to neural networks, when the number of kernels and filters obtained through reinforcement learning in DeepU-Net was selected as a hyperparameter of neural network. The results show that the training accuracy is 0.5% and the verification accuracy is 0.3% better than DeepU-Net. The results of this study can be applied to various fields such as MRI brain imaging diagnosis, thermal imaging camera abnormality diagnosis, Nondestructive inspection diagnosis, chemical leakage monitoring, and monitoring forest fire through CCTV.