• Title/Summary/Keyword: 동적 ID

Search Result 82, Processing Time 0.021 seconds

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

Biodistribution and Metabolism of I-123 Labelled Fatty Acid(I) : [I-123]15-(p-iodophenyl)pentadecanoic acid(IPPA) (I-123 표지 지방산의 체내 분포 및 대사(I) : [I-123]15-(p-iodophenyl)pentadecanoic acid(IPPA))

  • Chang, Young Soo;Lee, Dong Soo;Jeong, Jae Min;Suh, Yong-Sup;Chung, June-Key;Lee, Myung Chul;Koh, Chang-Soon
    • The Korean Journal of Nuclear Medicine
    • /
    • v.32 no.1
    • /
    • pp.50-60
    • /
    • 1998
  • I-123 labelled fatty acids are suitable for investigation of regional myocardial metabolism, so they are on the clinical trial. However, the precise properties of these materials are not characterized yet. We have synthesized phenylpentadecanoic acid and labeled this compound with I-123. The purpose of this study was to examine the stability, biodistribution, metabolism and SPECT imaging of [I-123]15-(p-iodophenyl)pentadecanoic acid(I-123-IPPA) that we made. The stability test of I-123-IPPA in serum of rat, mouse and human showed no free I-123 after 1 hour. In biodistribution study in mice for various time intervals after injection(5, 10, 15, 30, 60 minutes), uptake in myocardium was 14.5%ID/g(5 min), and 1.9%ID/heart(5 min), while uptake in muscles was 2.6%ID/g(5 min). Myocardium to blood ratio and myocardium to lung ratio increased for 5 min after injection and then decreased rapidly. Chromatographic data of rat blood and urine showed that little PPA was found in blood and urine at 15-20 min after injection. The myocardial I-123-IPPA SPECT images of a dog with myocardial infarction showed defects similar to those of Tc-99m-MIBI and F-18-FDG. These data suggest that I-123-IPPA is quite stable in vitro and shows favorable biodistribution in mice. SPECT imaging with I-123-IPPA demonstrated infarct zone as photon defect in dog model of myocardial infarction. I-123-IPPA may be used for the evaluation of fatty acid metabolism in clinical trials in Korea.

  • PDF

Mount Design of Helicopter FLIR Sensor Using Experimental Dynamic Model (실험적 동적 모델을 이용한 헬기용 FLIR 센서의 마운트 설계)

  • 조기대
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.14 no.11
    • /
    • pp.1129-1136
    • /
    • 2004
  • The structural modification to install a heavy sensor was made at the front extremities of the foreign-produced helicopter operated in the Korea Navy Mounting the sensor directly to the nose structure is unlikely to be practical because it lowers a dynamic mode of the airframe close to rotor blade passing frequencies, leading to increased helicopter vibration. Unfortunately we have no information on dynamic characteristics of the imported helicopter. So the experimental modal model derived from shake testing on the overall airframe of a working helicopter was used to solve the sensor Installation problems. The sensitivity analysis was done to evaluate what the best of modification woo)d be. Simple ID model and experimental modal data for mount system with sensor were Incorporated into overall dynamic model to assess the effects of the sensor installation on helicopter. Modal testing for the modified helicopter shows that the airframe modes are sufficiently displaced from rotor passing frequencies. The mount system has been proven fight to be sufficiently stable to meet vibration-level requirement for all required operational profiles.

Shift Control Strategy for Electric Controlled CVT Vehicle (전자 제어 CVT 차량의 변속제어전략)

  • 김동우;김현수
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.8 no.3
    • /
    • pp.85-97
    • /
    • 2000
  • In this paper, static and dynamic shift control stategies of CVT speed ratio are suggested. For the static shift control, in order to operate engine on the optimal operating region, a fuzzy control logic is used. In the fuzzy logic, S- factor that is defined as a degree of sportiness is introduced. Simulation results show that the static shift control strategy based on the fuzzy logic selects the optimal operating point automatically between the economy and the sporty mode corresponding to the driver's desire and the driving condition. For the dynamic shift control strategy, a shift speed map is suggested which determines the shift sped as fast or slow based on Δi, the difference between the desired speed ratio id and the actual speed ratio i, and throttle opening. It is seen from the simulation results that the CVT shift speed is determined by the dynamic shift control strategy to provide appropriate performance and comfort for the driver's demand and driving condition. Additionally, experiments are performed to investigate the dynamic performance of the shift speed for the lift foot up. From the experimental results, it is found that improved shift feeling can be obtained by the dynamic shift control strategy when lift foot up occurs.

  • PDF

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

Determination of Stress Intensity Factors by Strain Measurement (스트레인측정에 의한 응력확대계수 결정)

  • Lee, O.S.;Nah, K.C.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.12 no.8
    • /
    • pp.147-155
    • /
    • 1995
  • Recent experimental studies have been shown that strain gages can be employed to determine either static or dynamic stress intensity factors $K_{I}$ wiht relatively simple experiments. However, it does not usually provide a reliable value of stress intensity factor because of local yielding and limited regions for strain gage placement at the vicinity of the crack tip. This paper attempted to define a valid region and to indicate procedures for locating and orienting the strain gage to determine static toughness $K_{Is}$ accurately form one strain gage readings with respect to varying loadings. The strain gage methods was used for compact tension specimens made of Polycarbonate and PMMA(polymethyl methacrylate). Series expansions of the static and dynamic strain fields are applied. Strain gage orientation and location are then studied to optimize the strain response. Especially, in the dynamic experiment, the specimen employed is an oversized Charpy V-notch specimen which has been modified to provide significant constraint with a large elevation of the flow stress. The impact behavior of the specimen is monitored by placing strain gage near the crack tip. The dynamic toughness $K_{Id}$ is determined from the strain time traces of this gage.e.

  • PDF

A Dynamic Management Method for FOAF Using RSS and OLAP cube (RSS와 OLAP 큐브를 이용한 FOAF의 동적 관리 기법)

  • Sohn, Jong-Soo;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.39-60
    • /
    • 2011
  • Since the introduction of web 2.0 technology, social network service has been recognized as the foundation of an important future information technology. The advent of web 2.0 has led to the change of content creators. In the existing web, content creators are service providers, whereas they have changed into service users in the recent web. Users share experiences with other users improving contents quality, thereby it has increased the importance of social network. As a result, diverse forms of social network service have been emerged from relations and experiences of users. Social network is a network to construct and express social relations among people who share interests and activities. Today's social network service has not merely confined itself to showing user interactions, but it has also developed into a level in which content generation and evaluation are interacting with each other. As the volume of contents generated from social network service and the number of connections between users have drastically increased, the social network extraction method becomes more complicated. Consequently the following problems for the social network extraction arise. First problem lies in insufficiency of representational power of object in the social network. Second problem is incapability of expressional power in the diverse connections among users. Third problem is the difficulty of creating dynamic change in the social network due to change in user interests. And lastly, lack of method capable of integrating and processing data efficiently in the heterogeneous distributed computing environment. The first and last problems can be solved by using FOAF, a tool for describing ontology-based user profiles for construction of social network. However, solving second and third problems require a novel technology to reflect dynamic change of user interests and relations. In this paper, we propose a novel method to overcome the above problems of existing social network extraction method by applying FOAF (a tool for describing user profiles) and RSS (a literary web work publishing mechanism) to OLAP system in order to dynamically innovate and manage FOAF. We employed data interoperability which is an important characteristic of FOAF in this paper. Next we used RSS to reflect such changes as time flow and user interests. RSS, a tool for literary web work, provides standard vocabulary for distribution at web sites and contents in the form of RDF/XML. In this paper, we collect personal information and relations of users by utilizing FOAF. We also collect user contents by utilizing RSS. Finally, collected data is inserted into the database by star schema. The system we proposed in this paper generates OLAP cube using data in the database. 'Dynamic FOAF Management Algorithm' processes generated OLAP cube. Dynamic FOAF Management Algorithm consists of two functions: one is find_id_interest() and the other is find_relation (). Find_id_interest() is used to extract user interests during the input period, and find-relation() extracts users matching user interests. Finally, the proposed system reconstructs FOAF by reflecting extracted relationships and interests of users. For the justification of the suggested idea, we showed the implemented result together with its analysis. We used C# language and MS-SQL database, and input FOAF and RSS as data collected from livejournal.com. The implemented result shows that foaf : interest of users has reached an average of 19 percent increase for four weeks. In proportion to the increased foaf : interest change, the number of foaf : knows of users has grown an average of 9 percent for four weeks. As we use FOAF and RSS as basic data which have a wide support in web 2.0 and social network service, we have a definite advantage in utilizing user data distributed in the diverse web sites and services regardless of language and types of computer. By using suggested method in this paper, we can provide better services coping with the rapid change of user interests with the automatic application of FOAF.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Design of Regional Function Message of AIS for Hangul Text messaging (한글 텍스트 메시징을 위한 AIS 지역 기반 메시지 설계)

  • Yu, Dong-Hui
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.2
    • /
    • pp.77-81
    • /
    • 2013
  • The international standard AIS, which stands for the safety of ship navigation and vessel traffic management, provides 27 messages to exchange the navigational information of ship. Among 27 messages, message ID 6 and 8 are defined as the binary data format to exchange application specific information and are classified into IFM for international use and RFM for national or regional use. Since international standards are based on English, there have been some needs to exchange data in Hangul text for vessel traffic management to correct the static and dynamic ships' information. In this paper, I analyze international standards to provide a Hangul text messaging service based on RFM and propose a RFM message and a simple protocol to correct information of a ship.

GPU-accelerated Reliability Analysis Method using Dynamic Reliability Block Diagram based on DEVS Formalism (DEVS 형식론 기반의 Dynamic Reliability Block Diagram과 GPU 가속 기술을 이용한 신뢰도 분석 방법)

  • Ha, Sol;Ku, Namkug;Roh, Myung-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2013
  • This paper adopts the system configuration to assess the reliability instead of making a fault tree (FT), which is a traditional method to analyze reliability of a certain system; this is the reliability block diagram (RBD) method. The RBD method is a graphical presentation of a system diagram connecting the subsystems of components according to their functions or reliability relationships. The equipment model for the reliability simulation is modeled based on the discrete event system specification (DEVS) formalism. In order to make various alternatives of target system, this paper also adopts the system entity structure (SES), an ontological framework that hierarchically represents the elements of a system and their relationships. To enhance the calculation time of reliability analysis, GPU-based accelerations are adopted to the reliability simulation.