• Title/Summary/Keyword: 분배함수

Search Result 142, Processing Time 0.036 seconds

Methods for Call Distribution Service Feature of Service Control Logic in Intelligent Network (지능망에서 서비스 제어 로직의 호 분배 서비스 특성을 위한 방법)

  • Tae-Gyu Kang;Su-Ki Paik
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.1-10
    • /
    • 2001
  • In this paper, we define requirements for call distribution of service control logic in Intelligent Network, Also, we propose call distribution mechanism for every subscriber with different call distribution rates, The call distribution mechanism had been developed as a function of Premium-rate Service in Intelligent Network. Our call distribution mechanism applies to percentage distribution instead of circular or hierarchical distribution. The call distribution mechanism consists of call input. output. call distribution processing logic part, random number generator, and customers database. We propose the practical implementation of a call distribution mechanism and call distribution decision indicating number computation method. We show three methods, the rand() function in C language, microsecond by system clock, and proposed algorithm, to get call distribution decision indicating number. In order to optimal call distribution mechanism, we estimated the results of three methods on occurrence values and the number of occurrences.

  • PDF

Privacy Amplification of Quantum Key Distribution Systems Using Dual Universal Hush Function (듀얼 유니버셜 해쉬 함수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.38-42
    • /
    • 2017
  • This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.

The Selective p-Distribution for Adaptive Refinement of L-Shaped Plates Subiected to Bending (휨을 받는 L-형 평판의 적응적 세분화를 위한 선택적 p-분배)

  • Woo, Kwang-Sung;Jo, Jun-Hyung;Lee, Seung-Joon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.5
    • /
    • pp.533-541
    • /
    • 2007
  • The Zienkiewicz-Zhu(Z/Z) error estimate is slightly modified for the hierarchical p-refinement, and is then applied to L-shaped plates subjected to bending to demonstrate its effectiveness. An adaptive procedure in finite element analysis is presented by p-refinement of meshes in conjunction with a posteriori error estimator that is based on the superconvergent patch recovery(SPR) technique. The modified Z/Z error estimate p-refinement is different from the conventional approach because the high order shape functions based on integrals of Legendre polynomials are used to interpolate displacements within an element, on the other hand, the same order of basis function based on Pascal's triangle tree is also used to interpolate recovered stresses. The least-square method is used to fit a polynomial to the stresses computed at the sampling points. The strategy of finding a nearly optimal distribution of polynomial degrees on a fixed finite element mesh is discussed such that a particular element has to be refined automatically to obtain an acceptable level of accuracy by increasing p-levels non-uniformly or selectively. It is noted that the error decreases rapidly with an increase in the number of degrees of freedom and the sequences of p-distributions obtained by the proposed error indicator closely follow the optimal trajectory.

A Study on Public Key Distribution System (공개키 분배방식에 관한 연구)

  • 권창영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.981-989
    • /
    • 1990
  • Thos paper summarized previously proposed several public key distribution systems and proposes a new public key distribution system to generate an common secret conference key for public key distribution systems three or more user. The now system is based on discrete exponentiation, that is all operations involve reduction modulo p for large prime p and we study some novel characteristics for computins multiplicative inverse in GF(p). We use one-way communication to distribute work keys, while the other uses two-way communication. The security of the new system is based on the difficulty of determining logarithms in a finite field GF(p) and stronger than Diffie-Hellman public key distribution system.

  • PDF

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

An Authentication Method Using Identifier and Hash Function in Wireless Sensor Network (무선 센서 네트워크에서의 해쉬 함수와 식별자를 이용한 인증방안)

  • Lee, Eun-Gyong;Shin, Soo-Bok;Yeh, Hong-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.47-51
    • /
    • 2008
  • 무선 센서 네트워크 환경에서의 구성요소간의 상호 인증은 중요하다. $\mu$-TESLA에서의 브로드캐스트 인증은 인증시간의 지연이 발생한다. 지연의 발생은 현재 받은 메시지의 인증이 메시지를 받은 즉시 이루어지지 않고 다음 메시지를 받았을 때 이전의 메시지에 대한 인증이 이루어지기 때문이다. 이는 실시간 처리를 필요로 하는 통신에는 적합하지 않다. 또한 대칭키를 기반으로 인증하는 방법에서는 인증시간의 지연이 발생하지 않지만 인증을 위한 키가 노출되었을 때, 키를 재생성, 분배해야하는 문제가 있다. 본 논문에서 제안하는 인증방안은 식별자와 해쉬 함수를 이용하여 인증시간의 지연이 없는 실시간 인증과 인증에 사용하는 식별자가 노출되었더라도 키의 재생성 및 분배없이 인증을 달성하는 방법을 제시한다.

  • PDF

Driving Characteristics Improvement of SRM Winch System using Torque Sharing Function (토크분배함수를 이용한 SRM 윈치 시스템의 운전특성 개선)

  • An, Young-Joo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.4
    • /
    • pp.433-440
    • /
    • 2007
  • In this paper a new dynamoelectric winch system is introduced which is widely applied in shipping. building, architecture and so on. Generally in the winch system the squirrel cage induction motor is used as prime mover and line voltage is directly applied to the induction motor during operation. So it is difficult to obtain the smoothing revolution. because of variation of the weight of cargo and system operating method. Based on above reasons, the switched reluctance motor (SRM) is proposed to replace the induction motor because of more reliable mechanical structure, better traction characteristic and higher efficiency compared to induction motor. And in order to solve smoothing revolution problem, instantaneous torque control method based on torque sharing function (TSF) is used. Finally the validity of the proposed method is verified through the simulation and experimental results.

Adsorption Isotherm on the Nearest Neighbour Interaction System (최근접상호작용계에서의 흡착등온식)

  • Kim, Cheol-Ho;HwangBo, Seung
    • Proceedings of the KIEE Conference
    • /
    • 2001.11a
    • /
    • pp.290-291
    • /
    • 2001
  • 흡착입자간의 상호작용이 존재하는 경우 특히 최근접상호작용(nearest neighbour interaction)만이 고려된 경우의 흡착등온식(adsorption isotherm)을 구한다. 분배함수의 계산에는 Kramers와 Wannier에 의한 행열식 방법이 유용하게 사용된다.

  • PDF

Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem (양자키분배와 RSA 암호를 활용한 이중키 설정 키유도함수)

  • Park, Hojoong;Bae, Minyoung;Kang, Ju-Sung;Yeom, Yongjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.479-488
    • /
    • 2016
  • For a secure communication system, it is necessary to use secure cryptographic algorithms and keys. Modern cryptographic system generates high entropy encryption key through standard key derivation functions. Using recent progress in quantum key distribution(QKD) based on quantum physics, it is expected that we can enhance the security of modern cryptosystem. In this respect, the study on the dual key agreement is required, which combines quantum and modern cryptography. In this paper, we propose two key derivation functions using dual key agreement based on QKD and RSA cryptographic system. Furthermore, we demonstrate several simulations that estimate entropy of derived key so as to support the design rationale of our key derivation functions.