• Title/Summary/Keyword: Value Generation

Search Result 1,939, Processing Time 0.026 seconds

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

The Impact of Generation Z's Consumer Characteristics on the E-commerce Industry (Z세대의 소비 특성이 이커머스 산업에 미치는 영향)

  • Kim Ye Eun;Seung In Kim
    • Industry Promotion Research
    • /
    • v.9 no.3
    • /
    • pp.129-138
    • /
    • 2024
  • This study investigates the impact of Generation Z's consumer characteristics on the E-commerce industry using data from 60 respondents through an online survey. Generation Z, accustomed to the digital environment and quickly adopting new technologies, is noted as a strong consumer group. The study results indicate that value-driven and digital-friendly consumption significantly impact E-commerce usage. This suggests that E-commerce companies should enhance the digital experience and emphasize social responsibility and ethical values in their marketing strategies. These findings provide foundational data for effectively analyzing and responding to Generation Z's consumer characteristics in the E-commerce market.

Value Analysis Of Windpower Resource in Small Scale Grid (소규모 전력계통에서 풍력발전의 가치 분석)

  • Park, Min-Hyug;Lee, Jae-Girl;Yoon, Young-Beam
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.273-276
    • /
    • 2006
  • 신재생에너지의 효율 향상을 위한 시스템 개발과 병행하여 검토되어야 할 부문이 경제성 분석이다. 본 논문은 제주도 전력계통에 연계하여 운영중인 풍력발전의 자원과 발전량을 모의하기 위하여 제주도의 전력수요와 발전설비 특성, HDVC 수전 데이터, 풍속 등의 자료를 기반으로 가격예측을 위한 범용 소프트웨어들을 사용하여 에너지 시장 측면에서 풍력발전이 갖는 경제적 가치를 분석하였다.

  • PDF

Prediction of Form Accuracy during Traverse Grinding of Slender Workpiece Using the Cylindrical Prunge Grinding Data (원통연삭 실험자료를 이용한 트래버스 연삭공정중의 형상예측)

  • 박철우;이상조
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.3
    • /
    • pp.174-183
    • /
    • 2000
  • Non-Parallelism the axial direction occurs during grinding process of long slender shafts. The reason for the axial error is due to elastic deformation of the components, accumulation phenomenon of the grinding and wheel wear during the grinding process. The accumulation phenomenon, the size generation mechanism and the wheel wear process during traverse grinding result in complicated process at each step on the wheel surface. The grinding system stiffness obtained from the stiffness of the center on the tailstock and the workpiece varing according to the relative position of the wheel and the workpiece. Further more, the value of wheel wear increases as the grinding process advances. The above mentioned issues make the shape generation process during traverse grinding quite complicated. This research analyzes the shape generation process in the direction of the work spindle. First, the formulation of the grinding system stiffness was conducted and the simulation analysis method of the traverse grinding was established. Also, a measuring system for assessing the dimensinal accuracy of the workpiece has been developed.

  • PDF

Probabilistic Integrity Assessment of CANDU Pressure Tube for the Consideration of Flaw Generation Time (결함발생 시점을 고려한 CANDU 압력관 결함의 확률론적 건전성평가)

  • Kwak, Sang-Log;Lee, Joon-Seong;Kim, Young-Jin;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2001.11a
    • /
    • pp.155-160
    • /
    • 2001
  • This paper describes a probabilistic fracture mechanics (PFM) analysis based on Monte Carlo (MC) simulation. In the analysis of CANDU pressure tube, it is necessary to perform the PFM analyses based on statistical consideration of flaw generation time. A depth and an aspect ratio of initial semi-elliptical surface crack, a fracture toughness value, delayed hydride cracking (DHC) velocity, and flaw generation time are assumed to be probabilistic variables. In all the analyses, degradation of fracture toughness due to neutron irradiation is considered. Also, the failure criteria considered are plastic collapse, unstable fracture and crack penetration. For the crack growth by DHC, the failure probability was evaluated in due consideration of flaw generation time.

  • PDF

Value-based Distributed Generation Placements for Reliability Criteria Improvement

  • Heidari, Morteza;Banejad, Mahdi
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.2
    • /
    • pp.223-229
    • /
    • 2013
  • Restructuring and recent developments in the power system and problems arising from construction and maintenance of large power plants, increasing amount of interest in distributed generation (DG) source. Distributed generation units due to specifications, technology and location network connectivity can improve system and load point reliability indices. In this paper, the allocation and sizing of DG in distribution networks are determined using optimization. The objective function of the proposed method is to improve customer-based reliability indices at lowest cost. The placement and size of DGs are optimized using a Genetic Algorithm (GA). To evaluate the proposed algorithm, 34-bus IEEE test system, is used. The results illustrate efficiency of the proposed method.

Assessment of Landfill Gas Generation - A Case Study of Cheongju Megalo Landfill (매립지 가스 발생량 평가 - 청주권 광역생활폐기물 매립장 사례연구)

  • Hong, Sang-Pyo
    • Journal of Environmental Impact Assessment
    • /
    • v.17 no.5
    • /
    • pp.321-330
    • /
    • 2008
  • Methane is a potent greenhouse gas and methane emissions from landfills have been linked to global warming. In this study, LandGEM (Landfill Gas Emission Model) was applied to predict landfill gas quantity over time, and then this result was compared with the data surveyed on the site, Cheongju Megalo Landfill. LandGEM allows the input of site-specific values for methane generation rate (k) and potential methane generation capacity $L_o$, but in this study, k value of 0.05/yr and $L_o$ value of $170m^3/Mg$ were considered to be most appropriate for reflecting non-arid temperate region conventional landfilling, Cheongju Megalo Landfill. High discrepancies between the surveyed data and the predicted data about landfill gas seems to be derived from insufficient compaction of daily soil-cover, inefficient recovery of landfill gas and banning of direct landfilling of food garbage waste in 2005. This study can be used for dissemination of information and increasing awareness about the benefits of recovering and utilizing LFG (landfill gas) and mitigating greenhouse gas emissions.

Recent Advances in Thermoelectric Power Generation Technology

  • Sharma, Ashutosh;Lee, Jun Hyeong;Kim, Kyung Heum;Jung, Jae Pil
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.24 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • Thermoelectric power generation (TEG) technology with high figure of merit (ZT) has become the need of the modern world. TEG is a potent technology which can tackle most of the environmental issues such as global warming, change in climatic conditions over the globe, and for burning out of various resources of non-renewable energy like as petroleum deposits and gasolines. Although thermoelectric materials generally convert the heat energy from wastes to electricity according to the theories Seebeck and Peltier effects yet they have not been fully exploited to realize their potential. Researchers are focusing mainly on how to improve the current ZT value from 1 to 2 or even 3 by various approaches. However, a higher ZT value is found to be difficult due to complex thermoelectric properties of materials. Hence, there is a need for developing materials with high figure of merit. Recently, various nanotechnological approaches have been incorporated to improve the thermoelectric properties of materials. In this review paper, the authors have performed a thorough literature survey of various kinds of TEG technology.

A Study on the Riskiness of Dust Explosion of Feed-Stuff (가축사료의 분진폭발 위험성에 관한 연구)

  • 이창우;함영민;김정환;현성호
    • Fire Science and Engineering
    • /
    • v.12 no.2
    • /
    • pp.61-68
    • /
    • 1998
  • According to the results for the thermodynamic stability of feed-stuff dust, there are little change of initiation temperature of heat generation and heating value for used particle size. But initiation temperature of heat generation decreased with high heating rate whereas decomposition heat increased with particle size. Using the supporting gas, O2, initiation temperature of heat generation decreased remarkably than using the inert gas, N2, and heating value increased as twenty times under the same condition. When the ignition energy is given from the outside, used fine particle which can float in the air easily reacted tremendously with oxygen. Average maximum explosion pressure was 6.88 Kgf/$\textrm{cm}^2$ for 80/100 mesh.

  • PDF

A Secure Asymmetric Watermarking to the Public Key Attack (공개키 공격에 안전한 비대칭 워터마킹)

  • Li, De;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.173-180
    • /
    • 2008
  • In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack. this can detect the correlation by using other public key.

  • PDF