• Title/Summary/Keyword: 원동

Search Result 880, Processing Time 0.026 seconds

Vegetation Structure and Sediment Properties of Wondong Wetland in Nakdong-gang (낙동강 원동 습지의 식생 구조와 저토 특성)

  • Son, Sung-Gon;Lee, Pal-Hong;Kim, Cheol-Soo;Oh, Kyung-hwan
    • Journal of Wetlands Research
    • /
    • v.4 no.1
    • /
    • pp.21-31
    • /
    • 2002
  • Vegetation structure and sediment properties were investigated in the Wondong wetland of the Nakdong-gang, Yangsan-city, Gyeongsangnam-do, Korea. The vegetation type was classified into eleven communities based on the actual vegetation map: Miscanthus sacchariflorus community, Salix nipponica community, Phragmites communis community, Zizania latiofolia community, Trapa japonica community, Hydrilla verticillata community, Hydrocharis dubia community, Digitaria sanguinalis community, Nelumbo nucifera community, Phragmites japonica community, and Salix matsudana for. tortuosa community. Among them, Distribution area of Miscanthus sacchariflorus community was largest as 12.4 ha (36.3%). The dominant vegetation type was Miscanthus sacchariflorus community based on phytosocialogical method, and it was classified into two subcommunities; Persicaria maackiana - Miscanthus sacchariflorus subcommunity and Hydrilla verticillata - Miscanthus sacchariflorus subcommunity. Ranges of the sediment properties such as pH, conductivity, organic matter, total nitrogen, and available phosphorus were 4.9~6.2, $23{\sim}423{\mu}mho/cm$, 0.37~11.16%, 0.02~0.36% and 0.14~0.38mg/100g, respectively. Percentages of the partical size of the sediment such as clay, silt, and sand were 5.0~27.0%, 6.7~31.3%, and 46.7~88.3%, respectively.

  • PDF

The Development of Automatic Collection Method to Collect Information Resources for Wed Archiving: With Focus on Disaster Safety Information (웹 아카이빙을 위한 정보자원의 자동수집방법 개발 - 재난안전정보를 중심으로 -)

  • Lee, Su Jin;Han, Hui Lyeong;Sim, Min Jeong;Won, Dong Hyun;Kim, Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.4
    • /
    • pp.1-26
    • /
    • 2017
  • This study aims to provide the efficient sharing and utilization method of disasters scattered by each institution and develop automated collection algorithm using web crawler for disaster information in deep web accounts. To achieve these goals, this study analyzes the logical structure of the deep web and develops algorithms to collect the information. With the proposed automatic algorithm, it is expected that disaster management will be helped by sharing and utilizing disaster safety information.

An interleaver design of low latency for IEEE 802.11a Wireless LAN (IEEE 802.11a 무선 랜에 적용할 Low Latency 인터리버 설계)

  • Shin, Bo-Young;Lee, Jong-Hoon;Park, June;Won, Dong-Youn;Song, Sang-Seob
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.200-203
    • /
    • 2003
  • By minimizing the burst error of data and correcting the error, we can define the convolution coding and interleaving in IEEE 802.11a wireless tan system. Two step block interleaver was decided by coded bits per OFDM symbol and due to this it comes to the delay time in IEEE 802.11a. This is the point of the question which we must consider. We try to decrease the delay time by all 48-clock from interleavings, and we have proposed a way carried out the interleaving outputs per symbol. So in comparison with the existing interleaver, we can decrease the delay time in reading and writing data, as well as reduce the delay time of bit re-ordering per symbol. Also this scheme is apply in all x-QAM cases.

  • PDF

(Proposed) Standard for Digital Signature Mechanisms with Appendix -Part 2 : KCDSA(Korean Certificate-based Digital Signature Algorithm) (부가형 디지탈서명 방식 표준(안) 제 2부 : 확인서 이용 디지탈서명 알고리즘)

  • 문상재;박성준;원동호;이필중;임채훈;장청룡
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.233-243
    • /
    • 1995
  • 디지탈서명 알고리즘은 정보보호를 위한 필수적 조건이며 금년에 발표된 전산망보급확장과 이용 촉진에 관한 법률의 개정안에도 전자문서의 법적효력을 인정하고있고, 전자서명이 들어가야 함을 원칙으로 하고 있다. 따라서, 디지탈서명의 국가표준화가 시급해졌다. 이러한 때에 '94년부터 한국전자통신연구소 정보통신 표준 연구센터의 지원을 받아 디지탈서명 표준화가 진행되고 있는 것은 다행한 일이라 하겠다. 작년의 결과인 "부가형 디지탈서명 방식 - 제 1부 : 기본구조 및 모델"이 한국통신기술협회(TTA)를 통하여 한국전기통신 표준(KCS)으로 올려져 금년안에 국가 표준화를 목적으로 작업이 진행되고 있다. 올해에는 지난9월 표준안 발표회를 통하여 "부가형 디지탈서명 방식 표준(안) - 제 2부 확인서 이용 디지탈서명 알고리즘'이 발표되었다. 본 원고는 발표되었던 내용에 논의된 사항들을 반영하여 수정한 후 정리한 것이다. 본 표준안은 보완되어 11월 말에 한국전기통신 표준(KCS)으로 올려질 예정이다. 본문에서는 표준안으로 제안된 디지탈서명 알고리즘을 기술하였고, 부기에서는 알고리즘 수행시 유의점과 요구되는 부분함수들의 예를 기술하였다.분함수들의 예를 기술하였다.

  • PDF

The Study on AC Coupler for Developing Low Power PLC(Power Line Communication) Modem (저전력 전력선 통신 모뎀 개발을 위한 AC 커플러 개발)

  • Yoon, Jae-Shik;Wee, Jung-Chul;Won, Dong-Sun;Park, Chung-Ha;Song, Yong-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.495-496
    • /
    • 2007
  • 본 논문에서는 전력선 통신 모뎀에 필수적으로 사용하고 있는 AC 커플러의 대기모드 상태에서의 저전력 AC 커플러 개발에 관한 것으로, 전력선 통신(PLC : Power Line Communication) 모뎀은 디지털 가전기기를 위한 지능형 홈 네트워크 구축은 물론 원격검침 등의 각종 자동화 시스템에 활발하게 적용됨에 따라 저전력 대기모드 지원의 필요성이 요구되고 있다. 이러한 요구를 충족시키기 위해서 본 논문에서는 전력선 통신 모뎀에 필수적으로 사용하고 있는 AC 커플러의 대기모드 상태에서의 저전력 AC 커플러를 위해 1차측 AC 커플러를 송신측과 수신측으로 분리하여 설계하였다. 또한 수신 커플링 회로의 경우 현재 이용되고 있는 커플링 회로의 차단주파수를 10kHz에서 전력선 모뎀의 캐리어주파수에 영향을 미치지 않는 70kHz 고역 통과필터로 설계한다. 본 논문에서는 다양한 Simulation 및 실험을 통하여 제안된 AC 커플러가 기존 전력선 통신 모뎀과 동일한 성능을 유지하면서, 대기시 소모되는 소비전력을 크게 감소시켜, 기존 전력선 모뎀에 제안된 AC 커플러로 대치할 수 있음을 실험을 통해 규명하고 입증하였다.

  • PDF

Security Improvement on Biometric-based Three Factors User Authentication Scheme for Multi-Server Environments (멀티서버 환경을 위한 생체정보 기반 삼중 요소 사용자 인증 기법의 안전성 개선)

  • Moon, Jongho;Won, Dongho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2167-2176
    • /
    • 2016
  • In the multi-server environment, remote user authentication has a very critical issue because it provides the authorization that enables users to access their resource or services. For this reason, numerous remote user authentication schemes have been proposed over recent years. Recently, Lin et al. have shown that the weaknesses of Baruah et al.'s three factors user authentication scheme for multi-server environment, and proposed an enhanced biometric-based remote user authentication scheme. They claimed that their scheme has many security features and can resist various well-known attacks; however, we found that Lin et al.'s scheme is still insecure. In this paper, we demonstrate that Lin et al.'s scheme is vulnerable against the outsider attack and user impersonation attack, and propose a new biometric-based scheme for authentication and key agreement that can be used in the multi-server environment. Lastly, we show that the proposed scheme is more secure and can support the security properties.

A study on the efficient 1-pass password-based key exchange protocol (효율적인 1-pass 패스워드 기반 키 분배 프로토콜에 관한 연구)

  • Ahn, Sang-Man;Oh, Soo-Hyun;Won, Dong-Ho
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1119-1122
    • /
    • 2002
  • 본 논문에서는 Ford와 Kaliski[6]가 제안한 패스워드 은닉 기술을 적용하여 클라이언트와 서버의 은닉 변수로 은닉된 값을 서버가 패스워드 검증자로 사용하는 새로운 패스워드 기반 키 교환 프로토콜을 제안한다. 제안하는 프로토콜은 패스워드 검증자를 비밀리에 보관하여야하는 다른 검증자 기반 방식과 달리 클라이언트와 서버의 은닉 변수가 적용된 검증자를 사용하여 서버의 패스워드 검증자에 대한 안전성을 증가시켰다. 또한 Nyberg-Ruppel 방식[4]을 적용하여, 한번의 통신으로 사용자 인증과 키 교환을 할 수 있다. 본 논문에서 제안하는 프로토콜 안전성은 이산대수문제인 DLP(Discrete logarithm Problem)와 DHP(Diffie-Hellman Problem)[6]에 의존한다. 따라서 DLP와 DHP의 가정하에, 제안된 프로토콜은 오프라인 사진공격(off-line dictionary attack), 서버 데이터 도청(server data eavesdropping), 전향적 안전성(forward secrecy), Denning-Sacco 공격[1]에 대하여 안전하다.

  • PDF

A Study on Public Key Distribution System (공개키 분배방식에 관한 연구)

  • 권창영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.981-989
    • /
    • 1990
  • Thos paper summarized previously proposed several public key distribution systems and proposes a new public key distribution system to generate an common secret conference key for public key distribution systems three or more user. The now system is based on discrete exponentiation, that is all operations involve reduction modulo p for large prime p and we study some novel characteristics for computins multiplicative inverse in GF(p). We use one-way communication to distribute work keys, while the other uses two-way communication. The security of the new system is based on the difficulty of determining logarithms in a finite field GF(p) and stronger than Diffie-Hellman public key distribution system.

  • PDF

Group Key Agreement Protocols for Combined Wired/Wireless Networks (유무선 통합 네트워크 환경에 적합한 그룹 키 동의 프로토콜)

  • Nam Junghyun;Kim Seungjoo;Won Dongho;Jang Chungryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.607-615
    • /
    • 2005
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely establish a common secret key. Over the years, a number of solutions to this problem have been proposed with varying degrees of complexity. However, there seems to have been no previous systematic look at the growing problem of key agreement over combined wired/wireless networks, consisting of both high-performance computing machines and low-power mobile devices. In this paper we present an efficient group key agreement scheme well suited for this networking environment. Our scheme meets efficiency, scalability, and all the desired security requirements.

Behavior and flow characteristics of pulsating flow in the jetflow region through cylindrical chokes (유압관로내 원통형 초크의 분류영역에서 맥동유동의 거동과 유동특성에 관한 연구)

  • ;;Moh, Y. W.
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.11
    • /
    • pp.3041-3053
    • /
    • 1995
  • Cylindrical chokes are used widely as components of hydraulic equipments. The dynamic characteristics between flowrate and pressure drop through the cylindrical chokes were discussed by the frequency characteristics of the chokes. It was assumed no pressure recovery occurred near the downstream of the choke. The pulsating jetflow from the outlet of cylindrical chokes show very complex behaviours which are quite different from the steady jet flow but it's not clarified quantitatively. In order to utilize the chokes as a flowmeter, it is indispensable to discuss the estimation of the dynamics of pressure drop in the downstream jetflow region of cylindrical chokes. In this experimental study, it is clarified that the reattachment length depended on pressure wave is compared with it depended on velocity wave. A pulsating flow is verified by visualization method. In the present study, the flow characteristic variables of laminar pulsating flow are investigated analytically and experimentally in a circular pipe. Characteristic parameters of the ratios of inertia(.PHI.$_{t,1}$) and viscous(.PHI.$_{z,1}$) term to pressure term are introduced to describe the flow pattern of laminar pulsating flow. flow.low.