• Title/Summary/Keyword: 실시간재사용

Search Result 3, Processing Time 0.015 seconds

Estimation of Individual Tree Volumes for the Japanese Red Cedar Plantations (삼나무조림지(造林地)의 입목(立木) 간재적(幹材積) 추정(推定)에 관(關)한 연구(硏究))

  • Lee, Young Jin;Hong, Sung Cheon;Kim, Dong Geun;Oh, Seung Hwan;Kim, Own Su;Cho, Jeong Ung
    • Journal of Korean Society of Forest Science
    • /
    • v.90 no.6
    • /
    • pp.742-746
    • /
    • 2001
  • This study was carried out to develop volume equations for Japanese Res Cedar(Cryptomeria japonica D. Don) trees which were widely planted from 1920s throughout the southern regions in south Korea. The 31 trees for stem analysis were selected in 6 different sites in the southern and 29 trees data were used for developing volume equation. The best equation in estimating Japanese Red Cedar trees's volume was suggested as $V=-0.002908+0.000125D^{1.907114}H^{0.645131}$. The simultaneous F-test for this equation revealed that the estimated individual tree volume was not significantly different (p=0.1936) from the observed tree volume for model evaluation. Therefore, this individual tree volume prediction equation could provide basic information for the construction of yield table and forest management.

  • PDF

Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards (스마트카드를 이용한 향상된 동적 ID기반 원격 사용자 인증 기술)

  • Shim, Hee-Won;Park, Joonn-Hyung;Noh, Bong-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.223-230
    • /
    • 2009
  • Among the remote user authentication schemes, password-based authentication methods are the most widely used. In 2004, Das et al. proposed a "Dynamic ID Based Remote User Authentication Scheme" that is the password based scheme with smart-cards, and is the light-weight technique using only one-way hash algorithm and XOR calculation. This scheme adopts a dynamic ID that protects against ID-theft attack, and can resist replay attack with timestamp features. Later, many flaws of this scheme were founded that it allows any passwords to be authenticated, and can be vulnerable to impersonation attack, and guessing attack. By this reason many modifications were announced. These scheme including all modifications are similarly maintained security against replay the authentication message attack by the timestamp. But, if advisory can replay the login immediately, this attempt can be succeeded. In this paper, we analyze the security vulnerabilities of Das scheme, and propose improved scheme which can resist on real-time replay attack using the counter of authentication. Besides our scheme still secure against impersonation attack, guessing attack, and also provides mutual authentication feature.

  • PDF

The moisture distribution in standing Pitch Pine trees (리기다소나무 입목(立木)의 수분분포(水分分布)에 관(關)하여)

  • Lee, P.W.;Han, K.S.
    • Journal of Korean Society of Forest Science
    • /
    • v.7 no.1
    • /
    • pp.45-49
    • /
    • 1968
  • This experiment was carried out to study moisture contents including in the woody parts of standing Pitch Pine trees. The moisture measuring samples were made from the parts of root, branch, top, sapwood and heartwood of test trees. The test trees and average moisture contents measured from the parts of trees are as table (1) and (2). According to the results this study may be concluded as followings. 1) In the winter felled Pitch Pine trees highest moisture contents are shown in the top wood but lowest in the heartwood among the parts of tree. 2) In comparing moisture contents showing between two parts of tree, significant differences are show between top or heartwood and other parts but between branch or sapwood and root are not shown. 3) As general there is no significant variation in moisture contents of root, sapwood and heartwood among the test trees but branch wood is shown considerable variation.

  • PDF