• Title/Summary/Keyword: Operation key

Search Result 1,738, Processing Time 0.033 seconds

A study on operation method of handling equipments in automated container terminals (자동화 컨테이너터미널에서 운송 장비의 운영방안에 관한 연구)

  • 이상완;최형림;박남규;박병주;권해경;유동호
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.296-303
    • /
    • 2002
  • The main subject to become a hub port is automation. The automated container terminal has already operated in advanced ports and it has been planned for the basic planning and operation design in domestic case. The key of automated container terminal is effective operation of both ATC(automated transfer crane) and AGV(automated guided vehicle) which is automated handling equipments. This is essential to poductivity of automated container terminal. This study suggests the most optimal method of equipment operation in order to minimize loading time using each three types of effective ATC operation methods and AGV dispatching rules in automated container terminals. As the automated equipment operation causes unexpected deadlocks or interferences, it should be proceeded on event-based real time. Therefore we propose the most effective ATC operation methods and AGV dispatching rules in this paper. The various states occurred in real automated container terminals are simulated to evaluate these methods. This experiment will show the most robust automated equipment operation method on various parameters(the degree of yard re-marshaling, the number of containers and the number of AGVs)

  • PDF

A study on operation method of handling equipments in automated container terminals (자동화 컨테이너터미널에서 운송 장비의 운영방안에 관한 연구)

  • 이상완;최형림;박남규;박병주;권해경;유동호
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.296-303
    • /
    • 2002
  • The main subject to become a hub port is automation. The automated container terminal has already operated in advanced ports and it has been planned for the basic planning and operation design in domestic case. The key of automated container terminal is effective operation of both ATC(automated transfer crane) and AGV(automated guided vehicle) which is automated handling equipments. This is essential to productivity of automated container terminal. This study suggests the most optimal method of equipment operation in order to minimize loading time using each three types or effective ATC operation methods and AGV dispatching rules in automated container terminals. As the automated equipment operation causes unexpected deadlocks or interferences, it should be proceeded on event-based real time. Therefore we propose the most effective ATC operation methods and AGV dispatching rules in this paper. The various states occurred in real automated container terminals are simulated to evaluate these methods. This experiment will show the most robust automated equipment operation method on various parameters(the degree of yard re-marshaling, the number of containers and the number of AGVs)

  • PDF

A Cryptographic Processor Supporting ARIA/AES-based GCM Authenticated Encryption (ARIA/AES 기반 GCM 인증암호를 지원하는 암호 프로세서)

  • Sung, Byung-Yoon;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.233-241
    • /
    • 2018
  • This paper describes a lightweight implementation of a cryptographic processor supporting GCM (Galois/Counter Mode) authenticated encryption (AE) that is based on the two block cipher algorithms of ARIA and AES. It also provides five modes of operation (ECB, CBC, OFB, CFB, CTR) for confidentiality as well as the key lengths of 128-bit and 256-bit. The ARIA and AES are integrated into a single hardware structure, which is based on their algorithm characteristics, and a $128{\times}12-b$ partially parallel GF (Galois field) multiplier is adopted to efficiently perform concurrent processing of CTR encryption and GHASH operation to achieve overall performance optimization. The hardware operation of the ARIA/AES-GCM AE processor was verified by FPGA implementation, and it occupied 60,800 gate equivalents (GEs) with a 180 nm CMOS cell library. The estimated throughput with the maximum clock frequency of 95 MHz are 1,105 Mbps and 810 Mbps in AES mode, 935 Mbps and 715 Mbps in ARIA mode, and 138~184 Mbps in GCM AE mode according to the key length.

Techno-Economic Study on Non-Capture CO2 Utilization Technology

  • Lee, Ji Hyun;Lee, Dong Woog;Kwak, No-Sang;Lee, Jung Hyun;Shim, Jae-Goo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.1
    • /
    • pp.109-113
    • /
    • 2016
  • Techno-economic evaluation of Non-Capture $CO_2$ Utilization (NCCU) technology for the production of high-value-added products using greenhouse gas ($CO_2$) was performed. The general scheme of NCCU process is composed of $CO_2$ carbonation and brine electrolysis process. Through a carbonation reaction with sodium hydroxide that is generated from brine electrolysis and $CO_2$ of the flue gas, it is possible to get high-value-added products such as sodium bicarbonate, sodium hydroxide, hydrogen & chloride and also to reduce the $CO_2$ emission simultaneously. For the techno-economic study on NCCU technology, continuous operation of bench-scale facility which could treat $2kgCO_2/day$ was performed. and based on the key performance data evaluated, the economic evaluation analysis targeted on the commercial chemical plant, which could treat 6 tons $CO_2$ per day, was performed using the net present value (NPV) metrics. The results showed that the net profit obtained during the whole plant operation was about 7,890 mKRW (million Korean Won) on NPV metrics and annual $CO_2$ reduction was estimated as about $2,000tCO_2$. Also it was found that the energy consumption of brine electrolysis is one of the key factors which affect the plant operation cost (ex. electricity consumption) and the net profit of the plant. Based on these results, it could be deduced that NCCU technology of this study could be one of the cost-effective $CO_2$ utilization technology options.

Comparative Study on Autonomous Vehicle Operation Status in South Korea and China - Focusing on Xiong'an New District in China and Sejong City in South Korea -

  • Sen Zhan;Choong-Sik Chung
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.12-31
    • /
    • 2024
  • Today, many countries around the world recognize the development of autonomous vehicles as a national growth engine, support technology development through various projects, and promote it as national policy. China and Korea are representative countries that are strongly promoting autonomous vehicle policies. The Chinese government's policy direction for self-driving cars focuses on support for fostering new industries. Korea has established mid- to long-term goals and plans to foster the future mobility industry as a key growth engine and is promoting these as a national task. Recently, China and Korea have established national pilot areas to test autonomous vehicle operation and are actively pursuing policies. We aim to compare and analyze the operation status of self-driving cars in China's Xiong'an New Area and South Korea's Sejong City and derive policy implications regarding self-driving cars, which are emerging as a key industry of the future. According to the analysis results, it was found that China's Xiong'an New District is ahead of Korea's Sejong City in terms of leader leadership. As a result, autonomous driving is being operated at the government-wide and national level in Xiong'an New Area. In terms of the driving force, in the case of Xiongan New Area, the policy is being promoted by companies centered on Baidu, and in the case of Sejong City, the policy is being promoted by the local government. As a result, it is estimated that Xiongan New Area will be able to reach commercialization before Sejong City. In the final policy proposal, it was proposed to break away from the existing government-led method and switch to a collaboration with the private sector and a private-led method.

  • PDF

Characteristics of KOMPSAT-3A Key Image Quality Parameters During Normal Operation Phase (정상운영기간동안의 KOMPSAT-3A호 주요 영상 품질 인자별 특성)

  • Seo, DooChun;Kim, Hyun-Ho;Jung, JaeHun;Lee, DongHan
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_2
    • /
    • pp.1493-1507
    • /
    • 2020
  • The LEOP Cal/Val (Launch and Early Operation Phase Calibration/Validation) was carried out during 6 months after KOMPSAT-3A (KOMPSAT-3A Korea Multi-Purpose Satellite-3A) was launched in March 2015. After LEOP Cal/Val was successfully completed, high resolution KOMPSAT-3A has been successfully distributing to users over the past 8 years. The sub-meter high-resolution satellite image data obtained from KOMPSAT-3A is used as basic data for qualitative and quantitative information extraction in various fields such as mapping, GIS (Geographic Information System), and national land management, etc. The KARI (Korea Aerospace Research Institute) periodically checks and manages the quality of KOMPSAT-3A's product and the characteristics of satellite hardware to ensure the accuracy and reliability of information extracted from satellite data of KOMPSAT-3A. To minimize the deterioration of image quality due to aging of satellite hardware, payload and attitude sensors of KOMPSAT-3A, continuous improvement of image quality has been carried out. In this paper, the Cal/Val work-flow defined in the KOMPSAT-3A development phase was illustrated for the period of before and after the launch. The MTF, SNR, and location accuracy are the key parameters to estimate image quality and the methods of the measurements of each parameter are also described in this work. On the basis of defined quality parameters, the performance was evaluated and measured during the period of after LEOP Cal/Val. The current status and characteristics of MTF, SNR, and location accuracy of KOMPSAT-3A from 2016 to May 2020 were described as well.

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

A Session Key Exchange Scheme for Secure Vehicle Communication in V2I-based VANET Environments (V2I 기반의 VANET 환경에서 안전한 차량 통신을 위한 세션 키 교환 기법)

  • Ryu, Seung-Ho;Jung, Sou-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.311-317
    • /
    • 2008
  • This paper proposes a session key exchange scheme for providing secure communication between Vehicles and Infrastructure in VANET. In the current VANET environment, IEEE 802.11i or PKI based mechanism is used to provide secure communication between V2I. However, since the vehicles and the frequent changes of network topology, VANET nodes have some difficulties to exchange the session key using IEEE 802.11i or PKI method. In the proposed scheme, Local Router is newly defined for exchanging the session key between moving vehicles and infrastructure. A session key is generated by XOR operation based on the random values between Local Router and OBU. As a result, the proposed scheme has a noticeable advantage on the fastness of key exchange by exchanging session keys between LR and OBU.

Characteristics and prediction methods for tunnel deformations induced by excavations

  • Zheng, Gang;Du, Yiming;Cheng, Xuesong;Diao, Yu;Deng, Xu;Wang, Fanjun
    • Geomechanics and Engineering
    • /
    • v.12 no.3
    • /
    • pp.361-397
    • /
    • 2017
  • The unloading effect from excavations can cause the deformation of adjacent tunnels, which may seriously influence the operation and safety of those tunnels. However, systematic studies of the deformation characteristics of tunnels located along side excavations are limited, and simplified methods to predict the influence of excavations on tunnels are also rare. In this study, the simulation capability of a finite element method (FEM) considering the small-strain characteristics of soil was verified using a case study. Then, a large number of FEM simulations examining the influence of excavations on adjacent tunnels were conducted. Based on the simulation results, the deformation characteristics of tunnels at different positions and under four deformation modes of the retaining structure were analyzed. The results indicate that the deformation mode of the retaining structure has a significant influence on the deformation of certain tunnels. When the deformation magnitudes of the retaining structures are the same, the influence degree of the excavation on the tunnel increased in this order: from cantilever type to convex type to composite type to kick-in type. In practical projects, the deformation mode of the retaining structure should be optimized according to the tunnel position, and kick-in deformation should be avoided. Furthermore, two methods to predict the influence of excavations on adjacent tunnels are proposed. Design charts, in terms of normalized tunnel deformation contours, can be used to quantitatively estimate the tunnel deformation. The design table of the excavation influence zones can be applied to determine which influence zone the tunnel is located in.

Improvement of Security Cryptography Algorithm in Transport Layer (전달 계층의 보안 암호화 알고리즘 개선)

  • Choi Seung-Kwon;Kim Song-Young;Shin Dong-Hwa;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.107-111
    • /
    • 2005
  • As Internet grows rapidly and next electronic commerce applications increase, the security is getting more important. Information security to provide secure and reliable information transfer is based on cryptography technique. The proposed ISEED(Improved SEED) algorithm based on block cryptography algorithm which belongs to secret-key algorithm. In terms of efficiency, the round key generation algorithm has been proposed to reduces the time required in encryption and decryption. The algorithm has been implemented as follow. 128-bit key is divided into two 64-bit group to rotate each of them 8-bit on the left side and right side, and then basic arithmetic operation and G function have been applied to 4-word outputs. In the process of converting encryption key which is required in decryption and encryption of key generation algorithm into sub key type, the conversion algorithm is analyzed. As a result, the time consumed to encryption and decryption is reduced by minimizing the number of plain text required differential analysis.

  • PDF