• Title/Summary/Keyword: Chain-block analysis

Search Result 92, Processing Time 0.036 seconds

A study on the weighting of the Environmental Index for SCM ESG -Focusing on the participation of Korean SMEs in the Global Secondary Battery Supply Chain- (공급망 ESG 환경평가지표 가중치 분석에 관한 연구 - 글로벌 이차전지 공급망 참여를 위한 한국 중소기업을 중심으로 -)

  • Jong-Hee Jeong;Seong-Ho Kim
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.1-22
    • /
    • 2023
  • Many major country have struggled to build a block of the secondary battery industry supply chain by considering their interests first. And their supply chain due diligence agreement mandates due diligence on human rights and environmental risks that may occur throughout the supply chain. So the integrated approach called supply chain ESG is needed. But there isn't to be a global standard for ESG yet. And the disclosure standards for each country are different, adding to companies' confusion. In this perspective, to present guidelines for establishing a supply chain ESG management strategy accompanied by Korean SMEs, this study presents environmental evaluation indicators of global secondary battery supply chain ESG customized for Korean SMEs and then performs weight analysis using AHP methodology. Through this, this study aims to suggest implications for accepting sustainability within the supply chain of Korean SMEs by presenting indicators to be considered first among environmental evaluation indicators in preparation for ESG due diligence of the global secondary battery supply chain.

Analysis of Distributed Cryptocurrency Exchange Model and Issues (분산 암호화폐 거래소 모델 및 이슈 분석)

  • Lee, Tae-Gyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.583-590
    • /
    • 2022
  • With the release of the Bitcoin source in 2009, cryptocurrencies are continuously developing and expanding the market. Recently, new applicability is expanding centered on NFT coin and metaverse payment service. In particular, the Central Cryptocurrency Exchange actively supports relay transactions between cryptocurrencies or between traditional fiat currencies and cryptocurrencies. The cryptocurrency trading market based on such a central exchange encouraged speculative factors of cryptocurrencies, strongly arousing speculation and futility of cryptocurrencies. In addition, the central cryptocurrency exchange induces the centralization of users and virtual assets, thereby hindering the decentralization and security enhancement strategies of the block chain. Therefore, this study describes the current status and problems of centrally controlled centralized cryptocurrency exchanges in service, and presents a distributed cryptocurrency exchange modeling strategy and major issues as a decentralization model of the exchange. This research can strengthen the anonymity, decentralization, and autonomy of cryptocurrency based on blockchain.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Multiplex Real-Time Polymerase Chain Reaction Analysis of Pathogens in Peri-Implantitis and Periodontitis: A Randomized Trial

  • Eun-Deok Jo
    • Journal of dental hygiene science
    • /
    • v.24 no.2
    • /
    • pp.97-106
    • /
    • 2024
  • Background: Periodontitis and peri-implantitis are diseases caused by pathogenic microorganisms that cause tissue damage and alveolar bone destruction resulting in the loss of teeth and implants. Due to the biological differences in the tissues surrounding the implants, peri-implantitis progresses more rapidly and intensely than periodontitis, underscoring the importance of understanding the characteristics and interactions of pathogenic bacteria. This study aimed to quantitatively analyze the pathogenic microorganisms associated with periodontitis and peri-implantitis in Korean patients and evaluate the correlation between these bacteria. Methods: A total of 98 (52 males and 46 females) were randomly selected and classified into three groups (healthy group [HG]=25; periodontitis group [PG]=31; and peri-implantitis group [PIG]=42). The relative expression levels of 11 pathogenic microorganisms collected from the gingival sulcus fluid were determined using multiplex real-time polymerase chain reaction. Results: Eikenella corrodens, Fusobacterium nucleatum, and Prevotella nigrescens were highly prevalent in the HG, PG, and PIG patients. The results of the relative quantitative analysis of microorganisms showed that all bacteria belonging to the green, orange, and red complexes were significantly more abundant in the PG and PIG than in the HG (p<0.05). Porphyromonas gingivalis in the red complex showed a positive correlation with all microorganisms in the orange complex (p<0.05). Campylobacter rectus in the orange complex showed a significant positive correlation with all microorganisms in the red complex, and with F. nucleatum, P. nigrescens, Prevotella intermedia, and Eubacterium nodatum (p<0.05). Conclusion: P. gingivalis, C. rectus, and F. nucleatum exhibit strong interactions. Removing these bacteria can block complex formation and enhance the prevention and treatment of periodontitis and peri-implantitis.

Analysis and Comparison on Full Adder Block in Deep-Submicron Technology (미세공정상에서 전가산기의 해석 및 비교)

  • Lee, Woo-Gi;Kim, Jeong-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.67-70
    • /
    • 2003
  • In this paper the main topologies of one-bit full adders, including the most interesting of those recently proposed, are analyzed and compared for speed, power consumption, and power-delay product. The comparison has been performed on circuits, optimized transistor dimension to minimize power-delay product. The investigation has been carried out with properly defined simulation runs on a Cadence environment using a 0.25-${\mu}m$ process, also including the parasitics derived from layout. Performance has been also compared for different supply voltage values. Thus design guidelines have been derived to select the most suitable topology for the design features required. This paper also proposes a novel figure of merit to realistically compare n-bit adders implemented as a chain of one-bit full adders. The results differ from those previously published both for the more realistic simulations carried out and the more appropriate figure of merit used. They show that, except for short chains of blocks or for cases where minimum power consumption is desired, topologies with only pass transistors or transmission gates are not attractive.

  • PDF

Improvement of Iterative Algorithm for Live Variable Analysis based on Computation Reordering (사용할 변수의 예측에 사용되는 반복적 알고리즘의 계산순서 재정렬을 통한 수행 속도 개선)

  • Yun Jeong-Han;Han Taisook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.795-807
    • /
    • 2005
  • The classical approaches for computing Live Variable Analysis(LVA) use iterative algorithms across the entire programs based on the Data Flow Analysis framework. In case of Zephyr compiler, average execution time of LVA takes $7\%$ of the compilation time for the benchmark programs. The classical LVA algorithm has many aspects for improvement. The iterative algorithm for LVA scans useless basic blocks and calculates large sets of variables repeatedly. We propose the improvement of Iterative algorithm for LVA based on used variables' upward movement. Our algorithm produces the same result as the previous iterative algorithm. It is based on use-def chain. Reordering of applying the flow equation in DFA reduces the number of visiting basic blocks and redundant flow equation executions, which improves overall processing time. Experimental results say that our algorithm ran reduce $36.4\%\;of\;LVA\;execution\;time\;and\;2.6\%$ of overall computation time in Zephyr compiler with benchmark programs.

Electronic Structure and Bonding in the Ternary Silicide YNiSi3

  • Sung, Gi-Hong;Kang, Dae-Bok
    • Bulletin of the Korean Chemical Society
    • /
    • v.24 no.3
    • /
    • pp.325-333
    • /
    • 2003
  • An analysis of the electronic structure and bonding in the ternary silicide YNiSi₃is made, using extended Huckel tight-binding calculations. The YNiSi₃structure consists of Ni-capped Si₂dimer layers and Si zigzag chains. Significant bonding interactions are present between the silicon atoms in the structure. The oxidation state formalism of $(Y^{3+})(Ni^0)(Si^3)^{3-}$ for YNiSi₃constitutes a good starting point to describe its electronic structure. Si atoms receive electrons from the most electropositive Y in YNiSi₃, and Ni 3d and Si 3p states dominate below the Fermi level. There is an interesting electron balance between the two Si and Ni sublattices. Since the ${\pi}^*$ orbitals in the Si chain and the Ni d and s block levels are almost completely occupied, the charge balance for YNiSi₃can be rewritten as $(Y^{3+})(Ni^{2-})(Si^{2-})(Si-Si)^+$, making the Si₂layers oxidized. These results suggest that the Si zigzag chain contains single bonds and the Si₂double layer possesses single bonds within a dimer with a partial double bond character. Strong Si-Si and Ni-Si bonding interactions are important for giving stability to the structure, while essentially no metal-metal bonding exists at all. The 2D metallic behavior of this compound is due to the Si-Si interaction leading to dispersion of the several Si₂π bands crossing the Fermi level in the plane perpendicular to the crystallographic b axis.

Performance Analysis of Joint Call Admission Control(JCAC) According to Resource Reservation Rate Changes in LTE-WLAN Heterogeneous Network Environment (LTE-WLAN 이종 네트워크 환경에서 자원예약률 변화에 따른 통합 호 수락 제어의 성능분석)

  • Kim, Yi-Kang;Kim, Seung-Yeon;Ryu, Seung-Wan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.473-484
    • /
    • 2011
  • In this paper, we analyze and propose the Joint Call Admission Control(JCAC) scheme to combine network selection scheme and radio resource reservation based Call Admission Control(CAC) in LTE-WLAN heterogeneous networks. First, We propose the JCAC system that uses network decision rate to select a network for terminal and radio resource reservation scheme in overlaying LTE-WLAN network environment. And we analyze the performance of a proposed system using markov chain model. The performance is presented in terms of the new call blocking probability, handoff call dropping probability, and channel utilization of each network. As a performance result of the our research, the system using JCAC is better than the system using non-JCAC. We found a suitable resource reservation rate that is 10% in the system using JCAC. Our work may be useful as a guideline of resource reservation rate to introduce JCAC system using resource reservation scheme in overlaying LTE-WLAN network environment.

Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain (해쉬 체인 기반의 안전한 하둡 분산 파일 시스템 인증 프로토콜)

  • Jeong, So Won;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.831-847
    • /
    • 2013
  • The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it is a trend to integrate the big data technologies into the company work. Especially, Hadoop is regarded as the most representative big data technology due to its terabytes of storage capacity, inexpensive construction cost, and fast data processing speed. However, the authentication token system of Hadoop Distributed File System(HDFS) for the user authentication is currently vulnerable to the replay attack and the datanode hacking attack. This can cause that the company secrets or the personal information of customers on HDFS are exposed. In this paper, we analyze the possible security threats to HDFS when tokens or datanodes are exposed to the attackers. Finally, we propose the secure authentication protocol in HDFS based on hash chain.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.