• Title/Summary/Keyword: Operation key

Search Result 1,728, Processing Time 0.024 seconds

Metabolic Pathways of Hydrogen Production in Fermentative Acidogenic Microflora

  • Zhang, Liguo;Li, Jianzheng;Ban, Qiaoying;He, Junguo;Jha, Ajay Kumar
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.5
    • /
    • pp.668-673
    • /
    • 2012
  • Biohydrogen production from organic wastewater by anaerobically activated sludge fermentation has already been extensively investigated, and it is known that hydrogen can be produced by glucose fermentation through three metabolic pathways, including the oxidative decarboxylation of pyruvic acid to acetyl-CoA, oxidation of NADH to $NAD^+$, and acetogenesis by hydrogen-producing acetogens. However, the exact or dominant pathways of hydrogen production in the anaerobically activated sludge fermentation process have not yet been identified. Thus, a continuous stirred-tank reactor (CSTR) was introduced and a specifically acclimated acidogenic fermentative microflora obtained under certain operation conditions. The hydrogen production activity and potential hydrogen-producing pathways in the acidogenic fermentative microflora were then investigated using batch cultures in Erlenmeyer flasks with a working volume of 500 ml. Based on an initial glucose concentration of 10 g/l, pH 6.0, and a biomass of 1.01 g/l of a mixed liquid volatile suspended solid (MLVSS), 247.7 ml of hydrogen was obtained after a 68 h cultivation period at $35{\pm}1^{\circ}C$. Further tests indicated that 69% of the hydrogen was produced from the oxidative decarboxylation of pyruvic acid, whereas the remaining 31% was from the oxidation of NADH to $NAD^+$. There were no hydrogen-producing acetogens or they were unable to work effectively in the anaerobically activated sludge with a hydraulic retention time (HRT) of less than 8 h.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

MPC-based Two-stage Rolling Power Dispatch Approach for Wind-integrated Power System

  • Zhai, Junyi;Zhou, Ming;Dong, Shengxiao;Li, Gengyin;Ren, Jianwen
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.648-658
    • /
    • 2018
  • Regarding the fact that wind power forecast accuracy is gradually improved as time is approaching, this paper proposes a two-stage rolling dispatch approach based on model predictive control (MPC), which contains an intra-day rolling optimal scheme and a real-time rolling base point tracing scheme. The scheduled output of the intra-day rolling scheme is set as the reference output, and the real-time rolling scheme is based on MPC which includes the leading rolling optimization and lagging feedback correction strategy. On the basis of the latest measured thermal unit output feedback, the closed-loop optimization is formed to correct the power deviation timely, making the unit output smoother, thus reducing the costs of power adjustment and promoting wind power accommodation. We adopt chance constraint to describe forecasts uncertainty. Then for reflecting the increasing prediction precision as well as the power dispatcher's rising expected satisfaction degree with reliable system operation, we set the confidence level of reserve constraints at different timescales as the incremental vector. The expectation of up/down reserve shortage is proposed to assess the adequacy of the upward/downward reserve. The studies executed on the modified IEEE RTS system demonstrate the effectiveness of the proposed approach.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on the Influence of Smart Factory Key Factors on Management Performance through Internal Environmental Factors in Small and Medium Businesses (중소기업에서 내부 환경요인을 통한 Smart Factory 핵심요인이 경영성과에 미치는 영향 연구)

  • Jin, Sung-Ok;Seo, Young Wook
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.115-124
    • /
    • 2019
  • This study is an empirical study of 'the effect of the key factors of Smart Factory on management performance through internal environmental factors in small and medium enterprises'. The purpose of the research is to verify that the implementation of a Smart Factory affects the performance of management and contribute to the continued development of the company, and to suggest the national policy of expanding the deployment of a Smart Factory. The procedures were surveyed by working-level officials of small and medium-sized manufacturing companies with a Smart Factory and statistically analyzed with the SPSS and SMART PLS. The results of the study showed that first, the environmental factors within the company had a positive effect on the key components of the Smart Factory. Second, the key factor in Smart Factory has had a positive impact on management performance. The above evidence shows that the key factors in smart factory considering the environmental factors of an enterprise affect its management performance, thus laying the theoretical foundation for the performance of smart factory construction. In the future, we will study how to build a Smart Factory.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Development ofn Sharing Space Access Management System based on Mobile Key and RCU(Room Control Unit) (모바일 키 및 RCU에 기반한 공유공간 출입관리 시스템 개발)

  • Jung, Sang-Joong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.4
    • /
    • pp.202-208
    • /
    • 2020
  • Recently, the importance of non-face-to-face has been emphasized due to COVID-19, and the use of sharing spaces is also expanding. The use of uncontact check-in technology for access control of sharing spaces reduces waiting time and optimizes workers' efficiency, resulting in operational cost savings. In this paper, we propose a sharing space access management system based on a mobile key and RCU (Room Control Unit), access to the facility using a mobile key, and monitor the facility using an RCU. Proposal system is for shared accommodation, rental field (residence, sale-selling hotel), shared office, etc. when there is a one-time visitor on a specific day and time, the corresponding password is delivered to the mobile platform to expose and key the existing password. It is supported by a field-adaptive system that can reduce discomfort such as delivery. In order to test the operation of the proposed integrated system, tests were conducted according to scenarios to understand the overall status of the user's reservation, check-in, and check-out, and a 100% success rate was derived for each item by setting performance indicators to prove test reliability.

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

Mission Operation Capability Verification Test for Low Earth Orbit(LEO) Satellite by Utilizing Interface Environment between LEO Satellite and Ground Station (저궤도 위성과 지상국간 접속 환경을 활용한 임무수행능력 지상 검증 시험)

  • Lee, Sang-Rok;Koo, In-Hoi;Lim, Seong-Bin
    • Aerospace Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.142-149
    • /
    • 2014
  • After launch of Low Earth Orbit(LEO) satellite, Initial Activation Checkout(IAC) and Calibration and Validation(Cal & Val) procedure are performed prior to enter normal operation phase. During normal operation phase, most of the time is allocated for mission operation except following up measures to anomaly and orbit maintenance. Since mission operation capability is key indicator for success of LEO satellite program and consistent with promotion purpose of LEO satellite program, reliability should be ensured by conducting through test. In order to ensure reliability by examining the role of LEO satellite and ground station during ground test phase, realistic test scenario that is similar to actual operation conditions should be created, and test that aims to verify full mission cycle should be performed by transmitting created command and receiving image and telemetry data. This paper describes the test design and result. Consideration items for test design are described in detail and result of designed test items are summarized.

Factors Influencing Operation of Travel Agency Services (여행업 경영에 영향을 주는 요인)

  • Oh, Soo-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.10
    • /
    • pp.283-292
    • /
    • 2007
  • Recent studies on business performance in the operation of travel agency services note the importance of non-financial factors, in addition to financial factors. They also indicate that in order to enhance the business performance in travel agency services, it is necessary to emphasize the most competitive key factors based on the understanding of the circumstances with which those services are faced. The analyses of business performance in travel services and of related research Papers have showed that the major factors influencing the operation of travel agency services include the relationship with tourism-related companies the introduction of e-commerce and knowledge-based management, the services of employed workers, and brand awareness and advertising. The present study attempts to propose an approach to the efficient operation of travel agency services by reviewing and analyzing the different studies regarding these factors. To do so, this study employs the existing study reports and publications related to the operation of travel services, focusing mainly on literature review. The paper is composed of four chapters: The first is an introductory chapter; Chapter 2 provides the theoretical background; in Chapter 3 an analysis of the previous studies is attempted; and Chapter 4 presents the results of analysis and other considerable suggestions.