• Title/Summary/Keyword: keys

Search Result 1,082, Processing Time 0.031 seconds

Wood Identification of the Veneer Species that grow in Korea - I. Wood Characteristics and Identification by the Gross Features - (한국산(韓國産) 단판수종(單板樹種)의 목재식별(木材識別) - I. 육안적(肉眼的) 성질(性質)에 의한 목재(木材)의 특성(特性) 및 그 식별(識別) -)

  • Lee, Phil-Woo;Eom, Young-Geun
    • Journal of the Korean Wood Science and Technology
    • /
    • v.12 no.1
    • /
    • pp.11-30
    • /
    • 1984
  • This study was executed to offer the basical data needed to the plywood industry as examining on the wood characteristics of veneer species that grow in Korea. According to the aggravation of log import from foreign countries caused by the gradual exhaustion of wood resources in recent years, the study on wood characteristics of veneer species growing in Korea should be carried out preferentially in promotion of the domestic timber utilization and development of it's processing technique for plywood industry. 50 commercial veneer species in this study were selected from 33 genuses, and general macroseopical wood characteristics for them were examined and described by the species. And also keys for the identification based on gross features were briefly prepared and presented by gymnosperm and angiosperm respectively.

  • PDF

An Enhancing Technique for Scan Performance of a Skip List with MVCC (MVCC 지원 스킵 리스트의 범위 탐색 향상 기법)

  • Kim, Leeju;Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.107-112
    • /
    • 2020
  • Recently, unstructured data is rapidly being produced based on web-based services. NoSQL systems and key value stores that process unstructured data as key and value pairs are widely used in various applications. In this paper, a study was conducted on a skip list used for in-memory data management in an LSM-tree based key value store. The skip list used in the key value store is an insertion-based skip list that does not allow overwriting and processes all changes only by inserting. This behavior can support Multi-Version Concurrency Control (MVCC), which can simultaneously process multiple read/write requests through snapshot isolation. However, since duplicate keys exist in the skip list, the performance significantly degrades due to unnecessary node visits during a list traverse. In particular, serious overhead occurs when a range query or scan operation that collectively searches a specific range of data occurs. This paper proposes a newly designed Stride SkipList to reduce this overhead. The stride skip list additionally maintains an indexing pointer for the last node of the same key to avoid unnecessary node visits. The proposed scheme is implemented using RocksDB's in-memory component, and the performance evaluation shows that the performance of SCAN operation improves by up to 350 times compared to the existing skip list for various workloads.

Static Load Tests on Flexural Strength and Crack Serviceability of a Longitudinal Joint for the Slab-Type Precast Modular Bridges (슬래브 형식 프리캐스트 모듈러교량 종방향 연결부의 휨강도 및 균열 사용성에 관한 정적재하실험)

  • Lee, Jung-Mi;Lee, Sang-Yoon;Song, Jae-Joon;Park, Kyung-Hoon
    • Journal of the Korea Concrete Institute
    • /
    • v.27 no.2
    • /
    • pp.137-145
    • /
    • 2015
  • The slab-type precast modular bridge consists of the precast slab bridge modules which are connected in the transverse direction. The longitudinal joints between the precast slab bridge modules are filled with cast-in-place mortar. The construction of the slab-type precast modular bridge is completed by applying the prestressing force on the longitudinal joints. In this study, 4-points bending tests and 3-points bending tests were conducted to examine the effects of the prestressing force and the shape of joint on the flexural strength and crack serviceability of longitudinal joint. The results of 4-points bending tests showed that the flexural strength is affected by the prestressing force but not by the shape of join. From the results of 3-points bending tests by which the bending moment and the shear force are simultaneously applied on the joints of the specimens, it is observed that the shape of joint affects on the flexural strength and the crack behavior. The results of two types of bending tests confirmed that the prestressing force according to the design code is appropriate and the joint with two shear keys gives the better performances against the crack of joint.

Design and Analysis of Pseudorandom Number Generators Based on Programmable Maximum Length CA (프로그램 가능 최대길이 CA기반 의사난수열 생성기의 설계와 분석)

  • Choi, Un-Sook;Cho, Sung-Jin;Kim, Han-Doo;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.319-326
    • /
    • 2020
  • PRNGs(Pseudorandom number generators) are essential for generating encryption keys for to secure online communication. A bitstream generated by the PRNG must be generated at high speed to encrypt the big data effectively in a symmetric key cryptosystem and should ensure the randomness of the level to pass through the several statistical tests. CA(Cellular Automata) based PRNGs are known to be easy to implement in hardware and to have better randomness than LFSR based PRNGs. In this paper, we design PRNGs based on PMLCA(Programable Maximum Length CA) that can generate effective key sequences in symmetric key cryptosystem. The proposed PRNGs generate bit streams through nonlinear control method. First, we design a PRNG based on an (m,n)-cell PMLCA ℙ with a single complement vector that produces linear sequences with the long period and analyze the period and the generating polynomial of ℙ. Next, we design an (m,n)-cell PC-MLCA based PRNG with two complement vectors that have the same period as ℙ and generate nonlinear sequences, and analyze the location of outputting the nonlinear sequence.

The Relational Role of Customer Participation in Interaction Process (상호작용과정에서 고객참여의 관계적 역할)

  • Ahn, Jinwoo;Oh, Hyung Jun
    • Management & Information Systems Review
    • /
    • v.39 no.3
    • /
    • pp.37-51
    • /
    • 2020
  • Customer participation in the service encounter plays an important role in the interaction process. In addition, customer participation is affecting the development of relationships between customer-service provider. Previous researches revealed the role of customer participation through a fragmented and cross-sectional approach, however, given the dynamics of the relationship, it is necessary to identify the role of customer participation from a longitudinal perspective. In addition, it is necessary to determine the cause of the overlap between the antecedent variables and consequent variables. This study aims to identify the relational role of customer participation by clarifying how customer participation affects relationship development from a longitudinal perspective, focusing on trust and commitment variables which are keys to relationship marketing. The related role of customer participation is analyzed through a regression analysis through long-term data. The results of the study showed that commitment(t1) directly had a positive effect on customer participation. However, trust(t1) has been shown to have a direct positive effect on the sub-dimensions of customer participation, such as personal interaction and responsible behavior. Customer participation(t2) affected by this trust(t1) and commitment(t1) again turned out to have a positive effect on trust(t3) and commitment(t3). In conclusion, although customer participation is affected by the relational variables, it can be seen that customer participation is a major factor that can improve the relational variables again through the interaction process. For this reason, a service firm can seek to develop relationships with customers by drawing and utilizing their needs to exchange information and to interact in the service encounter.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Seed morphology of Euphorbia section Zygophyllidium and related taxa (대극속 Zygophy llidium절과 근연 분류군의 종자 형태)

  • Jin , Sun-Mi;Park, Ki-Ryong
    • Korean Journal of Plant Taxonomy
    • /
    • v.38 no.4
    • /
    • pp.389-403
    • /
    • 2008
  • Seed morphological studies of 12 species of sect. Zygophyllidium and related Poinsettia using light and scanning electron microscopy were conducted to test the hypotheses of the sectional boundaries and species relationships. Characteristics of seeds, and the keys of identification of 12 species were presented. Seeds of 12 species were divided into 6 types based on the UPGMA tree from numerical analyses using nine seed characters. Type I, including E. uniglandulosa, is characterized by the foveolate seed with granulate testa cells. Type II, including species E. exstipulata, E. lagunensis, E. bilobata, E. hexagonoides and E. chersonesa, was recognized by the presence of inter-cellular granules among testa cells. Type III, including E. cyathophora, has a seed with acute apex, and concentric circles on the surface of testa cells. Type IV, including species of E. dentata and E. pentadactyla, has a seed with caruncle and lacking inter-cellular granules among testa cells. Type V, including E. hexagona, was characterized by the ovate seeds and lacking inter-cellular granules. Type VI, including E. eriantha and E. lacera, was recognized by the seeds with rectangular shape with caruncle. Based on the seed morphology, sect. Zygophyllidium should be defined only species with E. exstipulata, E. lagunensis, E. bilobata, E. hexagonoides and E. chersonesa. E. hexagona, traditionally included in this section, was closely related to E. dentata from Poinsettia.

The morphology of Thalictrum L. in Korea (한국산 꿩의다리속(Thalictrum L.) 식물의 형태학적 연구)

  • Park , Seong-Jun;Park, Seon-Joo
    • Korean Journal of Plant Taxonomy
    • /
    • v.38 no.4
    • /
    • pp.433-458
    • /
    • 2008
  • This study were examined for their external morphological characters such as root, leaf, inflorescenses, flower, stamen, pistil, and fruit as to Korean Thalictrum L. and discussed taxanomic value of characters, and made out a new key. This study confirmed that specialized stems and roots type were divided into fibrous type, fibrous having a tuber type, long fusiform tuberous type, tuberoid type, rhizome type and stolon type. The stem were divided into two types based on existence and nonexistence of striate or pubescent. Leaves were usually 2-3-ternately and was divided into three types based on leaf apex, leaf base and number of lobe. Inflorescenses were divided into two type; corymb, panicle. Flower is bisexual, and don't have petal. It was divided from existence and nonexistence of calyx when it flowering. Especially, the stamens were divided from anther shape and apex shape, degree of dilation of filament, epidermic shape of filament etc., and the pistils were divided from glandular on ovary, length of carpel stipe etc.. The fruit is a achene and it was divided from achene shape, achene rib or wings, achene stipe length. This study suggest that useful characters for identifying section are degree of dilation of filament, anther shape, achene rib and wings, degree of dilation of achene. Also, roots, leaf shape, stamen and pistil shape, achene beak and achene length, achene and leaf hair appear to be useful characters for identifying species.

Integrated Authentication and Key Management Method among Heterogeneous Wireless Mobile Networks (이기종 무선 이동망간 통합 인증 및 키관리 기법)

  • Park Hyung-Soo;Lee Hyung-Woo;Lee Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.50-59
    • /
    • 2006
  • The new communication paradigm is rapidly shifted from wireless mobile networks to an All-IP(Internet Protocol) network, led by service industry leaders and communication manufacturers. In this paradigm, providing authentication and session keys of a subscriber becomes one of the critical tasks because of IP open accessibility among heterogeneous networks. In this paper, we introduce authentication process procedure of heterogeneous wireless mobile networks and develop so-called IMAS(Integrated Mobile Authentication Server) which can securely inter-work among all mobile networks and support the legacy networks with backward compatibility. Especially, in designing IMAS, mobile authentication inter-working mechanism, key management technique, and other issues to be overcome are presented. We analyze and evaluate the performance of authentication algorithm which creates session key. A simulation environment of IMAS is established, and a performance(TPS; Transaction Per Second) result is analyzed and evaluated. It turned out that IMAS works among heterogeneous wireless mobile networks without compensating efficiency and functionalities of the legacy networks and decrease the entropy of data redundancy and data inconsistency among networks because of the integrity of the distributed Data Base(DB).

A Nonunique Composite Foreign Key-Based Approach to Fact Table Modeling and MDX Query Composing (비유일 외래키 조합 복합키 기반의 사실테이블 모델링과 MDX 쿼리문 작성법)

  • Yu, Han-Ju;Lee, Duck-Sung;Choi, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.177-188
    • /
    • 2007
  • A star schema consists of a central fact table, which is surrounded by one or more dimension tables. Each row in the fact table contains a multi-part primary key(or a composite foreign key) along with one or more columns containing various facts about the data stored in the row. Each of the composit foreign key components is related to a dimensional table. The combination of keys in the fact table creates a composite foreign key that is unique to the fact table record. The composite foreign key, however, is rarely unique to the fact table retold in real-world applications, particularly in financial applications. In order to make the composite foreign key be the determinant in real-world application, some precalculation might be performed in the SQL relational database, and cached in the OLAP database. However, there are many drawbacks to this approach. In some cases, this approach might give users the wrong results. In this paper, an approach to fact table modeling and related MDX query composing, which can be used in real-world applications without performing any precalculation and gives users the correct results, is proposed.

  • PDF