• 제목/요약/키워드: 철회

Search Result 360, Processing Time 0.028 seconds

A Study on Multimedia Database Transmission Algorithm (멀티미디어 데이터베이스 전송 알고리즘에 관한 연구)

  • 최진탁
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.921-926
    • /
    • 2002
  • B+-Tree is the most popular indexing method in DBMS to manage large size data in more efficiency. However the existing B+-Tree has shortcomings in there is overhead on DISK/IO when the first time of constructing DB or of making Index, and it lessens the concurrency if there are frequent delete operations so that the index structure also should be changed frequently. To solve these problems almost DBMS is using batch construction method and lazy deletion method. But to apply B+-Tree, which is using batch construction method and lazy deletion method, into DBMS the technique for controlling and recovering concurrency is necessary, but its researching is still unsatisfactory so that there is a problem on applying it into actual systems. On this paper I suggest the technique for controlling and recovering concurrency how to implement the batch construction method and the lazy deletion method in actual DBMS. Through the suggested technique there is no cascade rollback by using Pending list, it enhances the concurrency by enabling insertion and deletion for base table on every reconstruction, and it shortens transaction response time for user by using system queue which makes the batch constructing operation is processed not in user's transaction level but in system transaction level.

  • PDF

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce (유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명)

  • Sung, Soon-Hwa
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.373-380
    • /
    • 2007
  • Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

Analysis of Consumer Value for the Business Model Development of Next Generation IPTV: Mobile IPTV (차세대 IPTV 비즈니스 모델 개발을 위한 소비자 가치 분석: 모바일 IPTV를 중심으로)

  • Shin, Min-Soo;Kim, Sung-Hee;Cho, Cheol-Hye
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.60-70
    • /
    • 2011
  • IPTV was introduced as the new growth engine of the broadcasting and telecommunications industry and has experienced a high growth rate as its subscribers exceeded 2 million in early 2010. However there have been some doubts on if the IPTV market will keep current growth drift. One of such suspicions is that IPTV market has not been developed by the competitiveness of IPTV industry itself. In addition, the recent slowdown of subscribers' growth and IPTV players' operating at a loss has been suggested as obstacles to the IPTV market growth. This sort of phenomenon has been brought about by ambiguous proposition of IPTV's own value as well as IPTV service positioning gap. To resolve these problems this study empirically investigates what customers want to get from IPTV service by analyzing switching value of IPTV subscribers. This study also identifies which values must be strategically considered to develop next generation IPTV services, in particular mobile IPTV services. Following the investigation, this study analyzes the possible positioning gap of mobile IPTV. Through this analysis, this study suggests which sort of service values need to be reconciled.

Estimation of the Spectral Power Distribution of Illumination for Color Digital Image by Using Achromatic Region and Population (디지털 영상에서 무채색 영역과 모집단을 이용한 조명광원의 분광방사 추정)

  • 곽한봉;서봉우;이철회;하영호;안석출
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.2
    • /
    • pp.39-46
    • /
    • 2001
  • In this paper we propose a new method that can be estimation the spectral power distribution of the light source from three-band images. the light source is estimated by dividing the reflected spectral power distribution of the maximum achromatic region(L(λ)) by the corresponding surface reflectance(Ο(λ)). In order to obtain reflected spectral power distribution of the maximum achromatic region from three-bend images, a modified gray world assumption algorithm is adapted. And the maximum surface reflectance is estimated using the principal component analysis method along with achromatic population. The achromatic population is created from a set of given Munsell color chips whose chroma vector is less than threshold. Cumulative contribution ratio of principal components from the first to the third for classified achromatic population was about 99.75%. The reconstruction of illumination spectral power distribution by using achromatic population and three-band digital images captured under various light source was examined, and evaluated by RMSE between the original and reconstructed illumination spectral power distribution. This work was supported by grant No (2000-1-30200-005-3) from the Basic Research Program of the Korea Science & Engineering Foundation.

  • PDF

Implementation of CCSDS Telecommand Decryptor in Geostationary Communications Satellite (정지궤도 통신위성의 CCSDS 원격명령 암호복호기 구현)

  • Kim,Jung-Pyo;Gu,Cheol-Hoe;Choe,Jae-Dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.10
    • /
    • pp.89-96
    • /
    • 2003
  • In this paper, a CCSDS(Consultative Committee for Space Data Systems) telecommand(TC) decryptor for the security of geostationary communications satellite was implemented. For the confidentiality of CCSDS TC datalink security, Option-A which implements the security services below the transfer sublayer was selected. Also CFB(Cipher Feedback) operation mode of DES(Data Encryption Standard) was used for the encryption of 56-bit data bits in 64-bit codeblock. To verify Decryptor function, the DES CFB logic implemented on A54SX32 FPGA(Field Programmable Gate Array) was integrated with interface and control logics in a PCB(Printed Circuit Board). Using a function test PC, the encrypted codeblocks were generated, transferred into the decryptor, decrypted, and the decrypted codeblocks were transmitted to the function test PC, and then compared with the source codeblocks. Through LED(Light Emitting Diode) ON operation by driving the relay related to Op-code decoded and the comparison between the codeblock output waveforms measured and those simulated, the telecommand decryptor function was verified.

Analysis of effectiveness of solar system internet to deep space exploration (태양계 인터넷이 심우주 탐사에 미치는 영향 분석)

  • Koo, Cheolhea;Kim, Changkyun;Rew, Dongyoung;Choi, Gihyuk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.3
    • /
    • pp.240-246
    • /
    • 2016
  • The hottest news and achievements of space science and research in recent years may be NASA Curiosity rover's exploration (2013) of Mars, China Chang'e 3's exploration (2013) of Moon, ESA Rosetta's exploration (2014) of Comet 67P/Churyumov-Gerasimenko, and NASA New Horizons' exploration (2015) of Pluto, which are very astonishing achievement since such a deep space journey was possible with current technology. In contrast the wonderful cruise and navigation technologies evolution of explorer in deep space, there are no remarkable changes in deep space data communication, it is still in conservative area, of which much changes are reluctantly accepted so far. But there are some movements of deep space exploration in order to allow ground brilliant technologies to deep space. One of those experiments is internet, whose main topic of this paper. In this paper, we will present the analysis of effectiveness of solar system internet to deep space exploration.

Buyer's Right of Rejection and Revocation of Acceptance under the Uniform Commercial Code Compared with English Law (UCC상 매수인의 물품거절 및 승낙 철회권의 영국법과의 비교연구)

  • Lee, Byung-Mun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.28
    • /
    • pp.3-36
    • /
    • 2005
  • Most legal systems provides the aggrieved buyer with a right to put an end to the contract. Unlike Civil Law systems, the right is rather complicated and uncertain in Common Law systems because they do not sharply distinguish between a refusal which amounts merely to a defence in the nature of the exceptio non adimpleti contractus, and one which is intended to abrogate the aggrieved party's obligations completely and to seek restitution of what he has already performed. That is, they do not draw any sharp distinction between the right of rejection or revocation and the right to put an end to the contract. This explains why the right to put an end to the contract under Civil Law systems are often compared with the right of rejection or revocation under Common Law systems in most academic papers. Having said that, this article describes and analyzes in detail the relevant UCC rules to the buyer's right of rejection and revocation, particularly the rules on the requirements for the right of rejection or revocation. This is for the purpose of providing legal advice to our sellers residing either in U.S.A. or in Korea who plan to enter into U.S.A markets and take academics' interest in the buyer's right which is deemed to be unique compared to the Civil Law systems. In addition, the study attempts to compare the rules as to the right of rejection and revocation under the UCC with those of English law which are stipulated mainly in the Sale of Goods Act (1979) in a statutory form. This may help one better to understand the rules of the UCC which are mostly originated with English law and to find in what way the rules of the UCC depart from those of English law.

  • PDF

A study on the screen printing of high definition used FM screen (FM Screen을 이용한 高精細 스크린 인쇄에 관한 연구)

  • Kim, Gi-Ho;Cho, Ga-Ram;Koo, Chul-Whoi
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.20 no.2
    • /
    • pp.31-43
    • /
    • 2002
  • Screen printing is a stencil process whereby ink is transferred to the substrate through a stencil supported by a fine fabric mesh. Therefore screen had a tendency to distort and swell, as ink was deposited between the fibers, and were difficult to clean. The tow importance of stencil parameters that affect print quality are stencil thread diameter and the fabric thickness because of their influence on both ink deposit and print definition. Since screen printing inks can be formulated to adhere to almost any surface, and the printing process itself can be handled almost any substrate in a wide variety of shape, screen printing is a very versatile process. The small size pronting is reproduced image used screen printing because the surface of substrates is not suited at screen printing method. In screen printing, the need of high definition printing is gradually increasing according to developing special inks. A conventional haftone, so called AM screening, is simple and easy to implement, but the haftone dot patterns by using this method are not free for the moire fringe. This paper is used densitometry and image analysis to investigate relation with printing according to screen mesh, opening size and resolution of copy in image reproduction used FM screen. We had the good result of dot gain and tone reproduction on the screen printing of high definition using FM screen.

  • PDF

Telecommand Decryption Verification for Engineering Qualification Model of Command Telemetry Unit in Communications Satellite (통신위성 원격측정명령처리기 성능검증모델 원격명령 암호복호 검증)

  • Kim, Joong-Pyo;Koo, Cheol-Hea
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.7
    • /
    • pp.98-105
    • /
    • 2005
  • In this paper, the decryption function of CCSDS telecommand of CTU EQM for the security of communications satellite was verified. In order to intensify the security level of DES CFB decryption algorithm applied to CTU EM, 3DES CFB decryption algorithm using three keys is implemented in the CTU EQM. As the decryption keys increased due to the 3DES algorithm, the keys and IV are stored in PROM memory, and used for the telecommand decryption by taking the keys and IVs corresponding to the selected key and IV indexes from the memory. The operation of the 3DES CFB is validated through the timing simulation of 3DES CFB algorithm, and then the 3DES CFB core implemented on the A54SX32 FPGA. The test environment for the telecommand decryption verification of the CTU EQM was built up. Through sending and decrypting the encrypted command, monitoring the opcodes, and confirming LED on/off by executing the opcodes, the 3DES CFB telecommand decryption function of the CTU EQM is verified.

The Method of MBS Data Transmission Synchronization Using Loss Preventive Device of Transmission Synchronization Information and Its Packet Data (전송 동기화 정보와 패킷 데이터 손실 방지 장치를 이용한 멀티캐스트/브로드캐스트 서비스 데이터 전송 동기화 방법)

  • Kim, Kwang-Yong;Kim, Young-Il;Cho, Cheol-Hoe;Ryu, Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.251-254
    • /
    • 2011
  • 와이브로(Wibro) 또는 WiFI 망에서 동일한 멀티캐스트 그룹에 속한 이동 단말기들은 동일한 MBS(멀티캐스트/브로드캐스트 방송 서비스) 콘텐츠를 수신한다. 동일한 MBS 존 내의 기지국(RAS: Radio Access Station) 들이 MBS 콘텐츠 소스로부터 수신된 MBS 콘텐츠에 대한 전송 시간을 동기화할 수 있도록 기지국들은 전송 동기화 정보와 신뢰성 있는 데이터 패킷 수신을 동기 시간을 결정하기 이전에 보장받을 수 있어야 한다. 만약에 동일한 MBS 존에 속하는 다수의 기지국 중에 전송 동기화 정보를 수신하지 못하거나 패킷 데이터 일부 또는 전부를 수신하지 못한다면, 동기 전송 시간을 결정하기 전에 이미 손실된 정보와 패킷 데이터를 이동 단말기로 전송하게 됨으로써 이동 단말기가 MBS 콘텐츠를 수신하면서 동일 MBS 존 내의 다른 기지국으로 핸드오버하게 되면 MBS 콘텐츠에 대한 끊김없는 수신을 보장할 수 없을 뿐만 아니라 매크로 다이버시티(macro diversity) 이득을 얻기 위한 동일한 MBS 존에서 이동 단말기들에게 전송되는 MBS 콘텐츠들의 동기를 보장 할 수 없다. 따라서, 본 논문에서는 동기 전송 시간을 결정하기 앞서서 다수의 RAS가 전송 동기화 정보와 신뢰성 있는 패킷 데이터 콘텐츠 수신을 보장받을 수 있는 장치를 보완한 멀티캐스트/브로드캐스트 서비스 데이터 전송 동기화 방법을 제안한다.

  • PDF