• Title/Summary/Keyword: 보호 동기

Search Result 310, Processing Time 0.026 seconds

A Key Stream Synchronization Compensation Algorithm using Address Bits on Frame Relay Protocol (프레임릴레이 프로토콜에서 주소비트를 이용한 키스트림 동기 보상 알고리즘)

  • 홍진근
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.2
    • /
    • pp.67-80
    • /
    • 1998
  • 논문에서는 프레임릴레이 프로토콜을 사용하는 암호 통신 시스템에 적합한 키 스트림 동기 방식을 제안하였다. 제안된 주소영역의 확장 비트를 이용한 키 스트림 동기 방식은 단위 측정 시간 동안 측정된 프레임릴레이 프로토콜의 주소영역의 확장 비트 정보와 플래그 패턴의 수신률을 이용하여 문턱값보다 적은 경우에 동기 신호와 세션 키를 전송하므로써 종래의 주기적인 동기 방식에서 전송 효율성 저하와 주기적인 상이한 세션 키 발생, 다음 주김까지 동기 이탈 상태로 인한 오류 확산 등의 단점을 해결하였다. 제안된 알고리즘을 데이터 링크 계층의 처리기능을 최소화하여 패킷 망의 고속화가 가능하도록 설계된 프레임릴레이 프로토콜에서 서비스되는 동기식 스트림 암호 통신 시스템에 적용하여 slip rate $10^{-7}$의 환경에서 주기가 Isec인 주기적인 동기 방식에서 요구되는 9.6*10/ sup 6/비트에 비해 6.4*$10^{5}$비트가 소요됨으로써 전송율 측면에서의 성능 향상과 오복호율과 오복호율과 오복호 데이터 비트 측면에서 성능 향상을 얻었다.다.

스트림 암호 시스템에 관한 연구

  • 이만영
    • Review of KIISC
    • /
    • v.1 no.1
    • /
    • pp.45-53
    • /
    • 1991
  • 스트림 암호 시스템(stream cipher system)은 동기방식과 자동동기방식으로 구분된 다. 본고에서는 각종 암호 시스템을 세분화하고 그의 정의, 이론적 해석, 암호해독을 위해 요구되는 조건 및 암호문오류정정 등을 다음 목차에 따라 연재로 기술 하고자 한다.

  • PDF

Effect of Self-growth Program on Morality and Achievement Motivation of Adolescents on Probation (자기성장프로그램이 보호관찰소 청소년의 도덕성과 성취동기에 미치는 영향)

  • Heo, Jeong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.155-163
    • /
    • 2013
  • This study aims to look into what influences a self-growth program has on morality and achievement motivation of adolescents on probation. As a result of the study, it was discovered that after the self-growth program, there was a statistically significant difference in interest in others(altruism) and their social devotion while there was no significant difference in the interest in self and social issues. Also, there was a statistically significant difference in future-orientation, confidence, a sense of responsibility, having a mind to face challenges, and task orientation while there was not a significant difference in having an adventurous mind. The results above indicate that the self-growth program has a significant influence on the morality and achievement motivation in adolescents on probation. Therefore, to enhance the morality and achievement motivation of adolescents, more organized research on self-growth programs is needed and their utilization should be improved.

A Study of Out-of-Step Relaying Scheme based on Multi-Agent System (멀티에이전트 기법을 적용한 동기탈조 계전 알고리즘 연구)

  • Lee, You-Jin;Yeo, Sang-Min;Kim, Chul-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.32_33
    • /
    • 2009
  • 통신기술이 발달하고 그 신뢰성이 높아짐에 따라 빠르고 정확한 신호 전달성을 다양한 형태로 전력계통에 적용하고자 하는 연구가 다각도로 이루어지고 있다. 이는 변전소자동화 및 배전자동화를 통한 분야에서 뿐만 아니라, 보호계전 분야에서도 통신을 이용한 새로운 기술을 적용하고자 하는 시도가 이루어져 왔다. 그 방법의 하나로 컴퓨터 공학에서 처음 제시된 멀티에이전트 시스템을 보호계전 방법에 적용하여 사고 발생 시 효과적으로 계통보호를 이룰 수 있는 방법에 대한 연구가 진행되고 있다, 본 논문에서는 다양한 보호계전 방법 중 발전기 보호를 위한 동기탈조 계전에 대해 멀티에이전트 시스템을 적용하고 결과를 분석함으로써 새로운 관점의 동기탈조 계전 방법을 제시 하였다.

  • PDF

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.

The Effect of Motive for Participation on the Satisfaction with Training for Caregivers (요양 보호사 교육에서 교육생의 참여동기가 교육만족도에 미치는 영향)

  • Roh, Hyo-Lyun;Lee, Eun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.268-275
    • /
    • 2011
  • With the purpose of improving the quality of training for caregivers, this study examines how caregivers' motivation to participate in training affects their level of satisfaction with their training. This study surveyed 281 trainees at a caregiver training agency in City B on their motivation to participate in, and satisfaction with, training. Descriptive statistics, factor analysis, and regression analysis were used. Activity-oriented training was chosen as the top motivator with the highest satisfaction level with regard to the trainers. Motivation particularly influenced activity-oriented and learning-oriented training. In contrast, goal-oriented activities did not affect the trainees' satisfaction with their training. The conclusion is that the level of caregivers' motivation to participate in training has the greatest effect on their satisfaction with their training.

Precision time sync. HW/SW platform for power system protection (전력시스템 보호를 위한 정밀 시각 동기 적용 HW/SW 플랫폼 기술)

  • Nam, Kyung-Deok;Son, Kyu-Jung;Chang, Tae-Gyu;Kang, Sang-Hee
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1036-1043
    • /
    • 2018
  • This paper presented future power system protection technologies through the HW/SW integration platform with IEC 61850 and IEEE c37.238 standards. To determine the implementation performance of the integrated platform, an example of EVM (Evaluation Module) was constructed to satisfy the standards. The platform has been identified as a future power system integrated IED(Intelligent Electronic Device) HW/SW technology that meets the level of error required by the time sync standard and the level of delay required by protecting the power system.

A ZS Synchronization Algorithm for the Security of T1 Carrier System (T1 전송시스템 보호를 위한 ZS 동기 알고리듬)

  • 이훈재;박봉주;장병화;문상재;박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.53-64
    • /
    • 1997
  • When we apply a synchronous stream cipher to the T1 carrier system, it can occur long consecutive 0's(or 1's) sequences in the received data. In this case, it is difficult to recover receiver clock and violates a communication protocol. This paper proposes block detection and serial detection method which suppress 0's sequences of more than k( $\geq$ 2) of the stream ciphertext in the T1 carrier system. These ZS methods keep security level and solve problems of stream synchronization.

Allowing a Large Access Timing Offset in OFDM-CDMA Using ZCZ Code and Block Spreading (ZCZ 부호와 블록 확산을 이용한 사용자 동기화 경감 OFDM-CDMA)

  • Na, Donj-jun;Choi, Kwonhue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.23-36
    • /
    • 2016
  • We propose a new type of OFDM-CDMA scheme which allows large inter-user timing offset using zero correlation zone(ZCZ) code in conjunction with block spreading technique. Moreover to maximize spectral efficiency, the proposed OFDMA does not have guard time(GT). This is opposite to the trends in the conventional schemes where GT are supposed to be larger to allow larger inter-user timing offset. It is remarkable that the proposed GT-free OFDM-CDMA scheme completely cancels inter-user interference in the multipath fading simply by despreading process. This inter-user interference-free feature still remains even there exist inter-user timing offsets as large as multiple OFDM symbols. Although the self-user interference exists due to no GT, it can be effectively suppressed by simple successive interference cancellation(SIC) from the first symbol in spread block as it is free from inter symbol interference(ISI).

Considering Barrier Overhead in Parallelizing AES-CCM (동기화 오버헤드를 고려한 AES-CCM의 병렬 처리)

  • Chung, Yong-Wha;Kim, Sang-Choon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.3-9
    • /
    • 2011
  • In this paper, we propose workload partitioning methods in parallelizing AES-CCM which is proposed as the wireless encryption and message integrity standard IEEE 802.11i. In parallelizing AES-CCM having data dependency, synchronizations among processors are required, and multi-core processors have a very large range of synchronization performance. We propose and compare the performance of various workload partitioning methods by considering both the computational characteristics of AES-CCM and the synchronization overhead.