• Title/Summary/Keyword: 회의키

Search Result 96, Processing Time 0.024 seconds

Studies on a Technique of the Generation Shortening for a Breeding Efficiency Promotion of Rape Oil Improvement -II. Influence of Different Maturing Stages to Seed Germination power and Dormancy in Brassica napus L.- (유채 성분육종 효율을 증진키 위한 세대단축 기술개발에 관한 연구 -제II보. 유채의 등숙차이가 종자발아능력 및 휴면에 미치는 영향-)

  • Lee, J.I.;Min, K.S.;Choo, G.P.
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.20
    • /
    • pp.100-106
    • /
    • 1975
  • Germinating ability of green seed in maturing period was investigated to develop the technics on generation shortening. Rapeseed did not germinate until 40 days after flowering (=DAF) in green seed and 50 DAF in dried seed. Effective germination to be utilized for generation shortening came on 55 DAF for dried seed by heating and on 75 DAF for green seed. The periodic time of seed dormancy in maturing period had two cycles and rest period was considered that it was different according to the ecological types of early, middle and late maturity.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Development of a Large Quantity of Inputs Interface System Using a Single Chip microcontroller (원칩 마이컴을 이용한 대용량 입력 인터페이스 시스템의 개발)

  • Park, Ju-Tae;Choi, Duck-sung;Jeong, Seung-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.215-221
    • /
    • 2016
  • In this thesis we introduce a large quantity of input interface system using a low cost single chip microcontroller which is consists of walking board with 1600 switches, RS485 communication for switch data communication and PC application software for walking pattern analysis. When a pedestrian walks on the walking board, the pattern analysis of foot pressed switches can be utilized on diverse divisions of sports and industry such as walking physical therapy, dancing, a large quantity of sensors interface system, etc.

정보통신안테나-정보통신회선 사용제도 개선

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.13
    • /
    • pp.32-35
    • /
    • 1988
  • 정보통신회선 사용제도가 대폭적으로 개선되었다. 그동안 협회가 “민간 VAN활성화 방안의 연구”, “전기통신 관계법령 정비에 관한 워크샾”. “공중전기통신사업 개정안에 대한 공청회” 등의 활동을 통해 회원사들의 요구사항을 수렴. 집약하여 체신부로 하여금 현행의 불합리한 회선사용의 제한을 완화토록 누차에 걸쳐 촉구한 결과 이번 개선조치를 얻어냈다. 이번 조치는 지난 1일 협회 법제분과위원회 석상에서 정부당국자에 의해 최초로 발표되어 회의참석자(회원사 임직원) 모두로부터 전폭적인 환영을 받았다. 특히 이제까지 그룹 VAN에만 허용하던 정보의 교환행위를 중소기업 대상 전산망 서비스분야까지 확대 허용한 점, 다중화 장치 접속 허용, 긴밀관계자 인정범위 확대 등의 내용은 업계측을 크게 고무하고 정보통신사업의 활성화를 촉진하는 획기적인 조치라는 것이 중평이다. 아울러 중소기업기본법 제2조의 기중에 관련한 확대허용 조치는 자칫 대규모 VAN업체에 대한 영세 S/W 업체들의 자본적, 기술적 예속을 가속화시킬 가능성을 잉태하고 있어 이들에 대한 육성.지원대책을 서둘러야 할 때임을 암시하고 있다. 이번 조치에 따라 체신부는 ‘89.1.1일자 시행을 목표로 공중통신사업자로 하여금 다중화장치 접속기준을 제정토록 지침을 하달한 것으로 알려졌다. 한편, 정부는 국내 정보통신사업 육성방안에 대한 연구.검토와 함께 전기통신관련법령의 전면적인 개편을 추진키 위해 이미 전문연구기관단체 등에 연구용역을 주는 등 본격적인 준비작업에 들어갔다.

  • PDF

A Hardware Implementation of Whirlpool Hash Function using 64-bit datapath (64-비트 데이터패스를 이용한 Whirlpool 해시 함수의 하드웨어 구현)

  • Kwon, Young-Jin;Kim, Dong-Seong;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.485-487
    • /
    • 2017
  • The whirlpool hash function adopted as an ISO / IEC standard 10118-3 by the international standardization organization is an algorithm that provides message integrity based on an SPN (Substitution Permutation Network) structure similar to AES block cipher. In this paper, we describe the hardware implementation of the Whirlpool hash function. The round block is designed with a 64-bit data path and encryption is performed over 10 rounds. To minimize area, key expansion and encryption algorithms use the same hardware. The Whirlpool hash function was modeled using Verilog HDL, and simulation was performed with ModelSim to verify normal operation.

  • PDF

Design of a Elliptic Curve Crypto-Processor for Hand-Held Devices (휴대 단말기용 타원곡선 암호 프로세서의 설계)

  • Lee, Wan-Bok;Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.728-736
    • /
    • 2007
  • The more improved the Internet and the information technology, the stronger cryptographic system is required which can satisfy the information security on the platform of personal hand-held devices or smart card system. This paper introduces a case study of designing an elliptic curve cryptographic processor of a high performance that can be suitably used in a wireless communicating device or in an embedded system. To design an efficient cryptographic system, we first analyzed the operation hierarchy of the elliptic curve cryptographic system and then implemented the system by adopting a serial cell multiplier and modified Euclid divider. Simulation result shows that the system was correctly designed and it can compute thousands of operations per a secdond.

Shadow of War Covering the Steam Punk Animations (스팀펑크 애니메이션에 드리운 전쟁의 그늘 -미야자키 하야오 감독의 작품을 중심으로-)

  • Oh, Jin-hee
    • Cartoon and Animation Studies
    • /
    • s.46
    • /
    • pp.63-84
    • /
    • 2017
  • Overwhelming images of vividly colored aircraft flying across the blue sky and steam gushing from massive machines are reminiscent of Japanese animation films, especially of works by master director Hayao Miyazaki. By presenting together steam engines, which are mechanical devices of the Industrial Age in the past, and aircraft of the future age, the director constructs ambiguous space and time. These special time and space constitute nostalgia for past time, with devices called steam engines as a medium, and a longing for science and the future as represented by aircraft. In addition, the anticipation and disappointment, ideals and regrets of humans who see these two from the perspective of the present are projected on the works. This shares the characteristic of the steam punk genre, which seeks to return to the past rather than to face current problems. A subgenre of science fiction (henceforth "sci-fi"), steam punk reflects fundamental skepticism of science and technology and mechanized civilization, which have developed beyond human control. In addition, as works that clearly display such characteristics, director Miyazaki's and < $Nausica{\ddot{a}}$ of the Valley of Wind> can be examined. With spectacles of steam engines and aircraft, these two works enticingly visualize narratives about nature and humans and about the environment and destruction. Such attractiveness on the part of the master director's works has led to support from fans worldwide. However, often in the backgrounds of director Miyazaki's works, which have depicted ideal worlds of nature, environment, and community as highly concentrated fantasies, lie presuppositions of war and the end of the world. As works that are especially prominent in such characteristics, there are and . These two works betray the expectations of the audience by establishing the actual wartime as the temporal background and proceeding toward narratives of reality. Trapped in the ontological identity of the director himself, the war depicted by him projects a subjective and romantic attitude. Such a problem stems also from the ambiguity of the hybrid space and time, which is basic to the steam punk genre. This is because the basic characteristic of steam punk is to transplant past time, which humans were able to control, in the future from a perspective of optimism and longing via steam engines rather than to face current problems. In this respect, steam punk animation films in themselves can be seen as having significance and limitations at the same time.

A Design of Point Scalar Multiplier for Binary Edwards Curves Cryptography (이진 에드워즈 곡선 암호를 위한 점 스칼라 곱셈기 설계)

  • Kim, Min-Ju;Jeong, Young-Su;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1172-1179
    • /
    • 2022
  • This paper describes a design of point scalar multiplier for public-key cryptography based on binary Edwards curves (BEdC). For efficient implementation of point addition (PA) and point doubling (PD) on BEdC, projective coordinate was adopted for finite field arithmetic, and computational performance was improved because only one inversion was involved in point scalar multiplication (PSM). By applying optimizations to hardware design, the storage and arithmetic steps for finite field arithmetic in PA and PD were reduced by approximately 40%. We designed two types of point scalar multipliers for BEdC, Type-I uses one 257-b×257-b binary multiplier and Type-II uses eight 32-b×32-b binary multipliers. Type-II design uses 65% less LUTs compared to Type-I, but it was evaluated that it took about 3.5 times the PSM computation time when operating with 240 MHz. Therefore, the BEdC crypto core of Type-I is suitable for applications requiring high-performance, and Type-II structure is suitable for applications with limited resources.

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.

원전고화폐기물 특성시험을 위한 시험법 선정방법

  • Kim, Gi-Hong;Yoo, Yeong-Geol;Hong, Gwon-Pyo;Jeong, Ui-Yeong;Park, Jong-Heon;Kim, Heon
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2004.06a
    • /
    • pp.219-221
    • /
    • 2004
  • 국가의 규제기관과 처분장에서는 방사성 폐기물의 안전한 영구처분을 위하여 폐기물 수용(인수)기준을 폐기물 발생자에게 준수토록 요구하게 되는데 이러한 폐기물 수용(인수)기준은 처분시설의 가동동안 인간과 환경 보호 그리고 최대 300년간의 제도적 통제기간을 고려하여 처분장의 안전성 확보를 위하여 설정되어진다. 폐기물 수용(인수)기준중 고화체의 안정성 평가와 관련하여 미국(NRC/BTP)은 폐기물의 종류와 고화매질에 따라 유리수, 압축강도, 방사성 조사특성, 미생물 영향 특성, 침수 및 침출 특성, 열순환 특성 등에 대하여 표준시험법을 제시하였으며, 또한 그의 기술기준치도 제시하고 있다. 그리고 프랑스(DRDD/ BECC)에서는 미국보다 매우 세밀하게 평가항목들을 분류하는 등의 처분장 운영국가에서는 고화체의 안정성관련 평가시험들을 처분 환경과 처분방식에 맞게 표준화하고 있다. 한편 국내에서는 과기부 고시 제2001-32호 "중.저준위 방사성폐기물 인도규정"이 있으나 이에는 고화체 관련하여 정성적인 안정성에 대하여서만 기술되어 있다. 이에 따라 원전폐기물 고화체에 대한 안정성 평가를 위한 시험법을 선정하기 위하여 아래 그림과 같은 절차에 따라 수행토록 하였다. 우선 대표적인 천층처분 운영국가인 미국과 프랑스의 시험법 그리고 IAEA 권고 시험법과 유사관련 한국 산업표준법들을 조사하고, 이들 시험법들의 주요 차이점을 기술적 관점에서 비교평가하고, 이어서 모의 방사성 및 비방사성 고화체를 이용하여 상기 시험법들을 각각 적용하고 또한 이들 시험법들간의 차이(시험 조건, 시편의 크기 등)에 기인한 상호 비교시험을 통하여 얻어진 시험결과들을 종합적으로 비교 검토하여 보수적 관점에서 시험법을 선정하는 것으로 방향을 잡았다. 이때 시험결과를 얻기 위한 모든 과정에 품질보증 활동을 적용키로 하였으며, 시험결과 분석/평가 과정과 시험법 선정에 각계(규제기관, 학계, 발전소 현장 및 산업계 등) 전문가로부터 기술자문회의를 통하여 자문 의견을 받기로 하였다. 특히 현재 폐기물 인수 기술기준치가 설정된 국가의 시험법을 심층 있게 검토하기로 하였다.검토하기로 하였다.

  • PDF