• Title/Summary/Keyword: 연결체인

Search Result 186, Processing Time 0.024 seconds

Bending Behavior of the Mooring Chain Links Subjected to High Tensile Forces (강한 인장 상태에서의 계류 체인 링크의 휨 거동)

  • Kim, Seungjun;Won, Deok-Hee
    • Journal of Korean Society of Steel Construction
    • /
    • v.29 no.2
    • /
    • pp.99-110
    • /
    • 2017
  • This paper presents the study of the bending behavior of mooring chain links for keeping the position of the offshore floating structures. In general, chain links have been thought as the axial members due to the fundamental boundary condition. But, the flexural stiffness can be induced to the contact surface between chain links when friction occurs at the surface of the chain links due to high tensile force. Especially, the mooring chains for offshore floating platforms are highly tensioned. If the floater suffers rotational motion and the mooring chain links are highly tensioned, the rotation between contact links, induced by the floater rotation, generates the bending moment and relevant stresses due to the unexpected bending stiffness. In 2005, the mooring chain links for the Girassol Buoy Platform were failed after just 5 months after facility installation, and the accident investigation research concluded the chain failure was mainly caused by the fatigue due to the unexpected bending stress fluctuation. This study investigates the pattern of the induced bending stiffness and stresses of the highly tensioned chain links by nonlinear finite element analysis.

A Design of Peer-to-Peer Based IPTV System using Multiple Chain Architecture (다중 체인구조를 이용한 Peer-to-Peer 기반 IPTV 시스템 설계)

  • Kim, Ji-Hoon;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.74-82
    • /
    • 2008
  • In this paper, we propose a P2P based IPTV system using a multiple chain architecture. Proposed system is robust to the peer churn. As opposed to the internet the IPTV network managed by a single ISP has fewer bandwidth constraints and end-to-end connectivity. So, we emphasize preferentially robustness of a P2P network in IPTV environment. A single chain structure which was proposed previously emphasizes simplicity, however there exists considerable delay time at the end part of peers as the number of peers increasing. As a solution to the problem, we propose the scheme which seperates the chain into several levels and again divides each level into spans to diminish a delay time. Though the chain is separated into level and span, basic structure of proposed scheme is still a chain structure. So the scheme simplifies the recovery procedure caused by join or departure of peers. We will show the improved performance of proposed scheme rather than single chain structure with respect to the delay time and reliability.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

Scheduling Model for Centralized Unequal Chain Clustering (중앙 집중식 불균등 체인 클러스터링을 위한 스케줄링 모델)

  • Ji, Hyunho;Baniata, Mohammad;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.43-50
    • /
    • 2019
  • As numerous devices are connected through a wireless network, there exist many studies conducted to efficiently connect the devices. While earlier studies often use clustering for efficient device management, there is a load-intensive cluster node which may lead the entire network to be unstable. In order to solve this problem, we propose a scheduling model for centralized unequal chain clustering for efficient management of sensor nodes. For the cluster configuration, this study is based on the cluster head range and the distance to the base station(BS). The main vector projection technique is used to construct clustering with concentricity where the positions of the base stations are not the same. We utilize a multiple radio access interface, multiple-input multiple-output (MIMO), for data transmission. Experiments show that cluster head energy consumption is reduced and network lifetime is improved.

Improvement of Cluster-head node's Transmission Method in Cluster-based WSN Protocol (클러스터 기반 WSN 프로토콜에서 클러스터 헤드 노드의 전송 방법 개선)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.87-91
    • /
    • 2019
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. Cluster-based Protocols elect Cluster Heads and divide sensor field into Clusters. The Cluster Head collects the data in the Cluster and transmits it to the Base Station. In the case of nodes elected as Cluster Heads, there is a problem of energy consumption. The chain-based Protocol links sensor nodes in a chain and finally transmits all data to the Base Station. In this paper, we intend to increase the network lifetime by using a chain to reduce the energy consumption of the Cluster Head in the Cluster-based Protocol, LEACH Protocol.

Extracting curved text lines using the chain composition and the expanded grouping method (체인 정합과 확장된 그룹핑 방법을 사용한 곡선형 텍스트 라인 추출)

  • Bai, Nguyen Noi;Yoon, Jin-Seon;Song, Young-Jun;Kim, Nam;Kim, Yong-Gi
    • The KIPS Transactions:PartB
    • /
    • v.14B no.6
    • /
    • pp.453-460
    • /
    • 2007
  • In this paper, we present a method to extract the text lines in poorly structured documents. The text lines may have different orientations, considerably curved shapes, and there are possibly a few wide inter-word gaps in a text line. Those text lines can be found in posters, blocks of addresses, artistic documents. Our method based on the traditional perceptual grouping but we develop novel solutions to overcome the problems of insufficient seed points and vaned orientations un a single line. In this paper, we assume that text lines contained tone connected components, in which each connected components is a set of black pixels within a letter, or some touched letters. In our scheme, the connected components closer than an iteratively incremented threshold will make together a chain. Elongate chains are identified as the seed chains of lines. Then the seed chains are extended to the left and the right regarding the local orientations. The local orientations will be reevaluated at each side of the chains when it is extended. By this process, all text lines are finally constructed. The proposed method is good for extraction of the considerably curved text lines from logos and slogans in our experiment; 98% and 94% for the straight-line extraction and the curved-line extraction, respectively.

Design and Implementation of Virtual Multi-Segment Firewall System (방화벽에서의 가상 다중세그먼트 구성 기법의 설계 및 구현)

  • Yi, Han-Wung;Lee, Seung-Won;Cho, Yoo-Kun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.533-535
    • /
    • 1998
  • 가상 다중 세그먼트 (Virtual Multi-Segment)란 하나의 LAN이 라우터나 방화벽을 사용하지 않고 가상적으로 여러 개의 세그먼트로 나뉘어진 것을 의미한다. 일반적으로 같은 LAN에 속한 호스트들일지라도 다양한 보안 정책을 가지게 되는데 그 결과로 우회 경로 공격(bypass path attack)이 가능해지고 (Hierarchical)방화벽 시스템을 구성하여 다른 보안 정책을 가진 세스먼트마다 방화벽을 구축하고 있는데 이 방식은 방화벽 시스템을 구성하여 다른 보안 정책을 가진 세그먼트마다 방화벽을 구축하고 있는데 이 방식은 방화벽을 여러 개 설치해야 하는 문제가 있다. 이런 문제를 해결하기 위해 본 논문에서 방화벽을 통해 지나오는 각 연결에 대해서 회선체인을 구성하는 기법을 이용하여 가상적인 다중 세그먼크를 구성한다. 회선체인구성을 효과적으로 수행하기 위해 Thumbpint기법을 사용하는데 이 기법은 동일한 시간대에 모든 회선이 갖는 내용에 대한 요약을 만들어 그 요약들을 가지고 어떤 회선들이 같은 내용을 가지고 있는지를 판단하여 회선체인을 구성하는 기법이다. 본 논문에서 가상 다중 세그먼트 방화벽을 설계와 구현하였다.

  • PDF

RFID Authentication Protocol of Improved Secure Weakness in Hash-chain Based Scheme (해시 체인 보안 취약성을 개선한 RFID 인증 프로토콜)

  • Seungbin Kim;Taek Lee;Myoungrak Lee;Hoh In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1024-1027
    • /
    • 2008
  • RFID는 자동 객체 식별 기술로써 유비쿼터스 환경과의 연결을 통해서 적용 범위가 더욱 확대되고 있다. 그러나 RFID 시스템은 전파를 이용하는 통신 구조와 낮은 태그 가격 제약으로 인해서 사용자의 프라이버시 문제와 악의적인 공격노출 등의 위험이 발생하고 있다. 이런 문제점들을 해결하기 위해 물리적인 방법과 암호학적인 접근 방법 등 많은 방법들이 제안되었다. 그 중에서 해시 체인 기법은 다른 방법과 비교하여 강력한 보안 수준을 제공하면서도 간단한 인증 과정이 장점이다. 그러나 재전송 공격과 스푸핑 공격에 취약한 문제점을 가지고 있다. 따라서 본 논문은 기존 해시 체인의 장점을 유지하면서 보안 취약성을 개선한 RFID 인증 프로토콜을 제안한다. 계산 효율성을 고려하여 최소한의 난수와 비트 연산(XOR)을 이용하여 보안 취약성을 개선한다.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Transaction Model Suggestion by using Two Enforcements with a Blockchain based on a Service Platform (서비스 플랫폼 기반 이중강화적용 블록체인 응용 거래모델 제안)

  • Lee, Kwan Mok;Kim, Yong Hwan;Bae, Ki Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.91-96
    • /
    • 2020
  • A blockchain is a technology in which all nodes participating in a distributed network manage each transaction's contents without a central server managing the transaction, which is a record of the transaction. The block containing the transaction record of a specific period is connected to the blockchain by referring to the hash value for the previous block, and the chain with the new block added is shared with all nodes again. Transactions using existing certificates will pass through FinTech, and in the near future, applications using blockchains are expected to emerge. In this study, we analyze the problems of the existing model, and propose a transaction model that applies the blockchain to come. Among various applications, this study develops a trading model targeting the energy sales market among the topics that will lead the fourth industrial revolution. As a result of analyzing the proposed model, it was possible to be sure of the possibility of a safer energy sales transaction than the existing method.