• Title/Summary/Keyword: Distribute

Search Result 1,334, Processing Time 0.033 seconds

Lubrication Characteristics of Condensed Water Molecules at Solid Surface through Molecular Simulation (고체표면에 응축된 물 분자의 윤활특성에 대한 분자시뮬레이션 연구)

  • Kim, Hyun-Joon
    • Tribology and Lubricants
    • /
    • v.37 no.5
    • /
    • pp.195-202
    • /
    • 2021
  • This paper presents a numerical analysis of the lubrication characteristics of condensed water molecules on a solid surface by conducting molecular dynamics simulations. We examine two models consisting of a simple hexahedral substrate with and without water molecules to reveal the lubrication mechanism of mono-layered water molecules. We perform a sliding simulation by contacting and translating a single asperity on the substrate under various normal loads. During the simulation, we measure the friction coefficient and atomic stress. When water molecules were interleaved between solid surfaces, atomic stress exerted on individual atom and friction coefficient were smaller than those of model without water molecule. Particularly, at a low load, the efficacy of water molecules in the reduction of atomic stress and friction is remarkable. Conversely, at high loads, water molecules rarely lubricate solid surfaces and fail to effectively distribute the contact stress. We found a critical condition in which the lubrication regime changes and beyond the condition, significant plastic deformation was created. Consequently, we deduce that water molecules can distribute and reduce contact stress within a certain condition. The reduced contact stress prevents plastic deformation of the substrate and thus diminishes the mechanical interlocking between the asperity and the substrate.

Public key broadcast encryption scheme using new converting method

  • Jho, Nam-Su;Yoo, Eun-Sun;Rhee, Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.199-206
    • /
    • 2008
  • Broadcast encryption is a cryptographical primitive which is designed for a content provider to distribute contents to only privileged qualifying users through an insecure channel. Anyone who knows public keys can distribute contents by means of public key broadcast encryption whose technique can also be applicable to many other applications. In order to design public key broadcast encryption scheme, it should devise some methods that convert a broadcast encryption scheme based on symmetric key cryptosystem to a public key broadcast encryption. Up to this point, broadcast encryption scheme on trial for converting from symmetric key setting to asymmetric public key setting has been attempted by employing the Hierarchical Identity Based Encryption (HIBE) technique. However, this converting method is not optimal because some of the properties of HIBE are not quite fitting for public key broadcast schemes. In this paper, we proposed new converting method and an efficient public key broadcast encryption scheme Pub-PI which is obtained by adapting the new converting method to the PI scheme [10]. The transmission overhead of the Pub-PI is approximately 3r, where r is the number of revoked users. The storage size of Pub-PI is O($c^2$), where c is a system parameter of PI and the computation cost is 2 pairing computations.

The Importance of CEO's Sustainable Leadership to Distribute Environmental Education Culture in the Organization

  • WOO, Hyein
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.8
    • /
    • pp.19-27
    • /
    • 2022
  • Purpose: CEOs develop policies through their effective decision-making while employees implement the policies so that a business realizes the expected returns. This research focuses on the importance of the CEO's sustainable leadership to distribute environmental education culture to improve employees' environmental performance. Research design, data and methodology: The PRISMA that is selected by the present research is an evidence-based minimum group of entities for reporting in systematic reviews and meta-analyses. The core focus of the concept is to note studies that evaluate the impacts of intervention and can also be utilized as a basis for writing systematic reviews rather than intervention evaluations. Results: The current investigation indicates that there are four kinds of suggestions (a. Increased organizational learning, b. Open communication, c. Participative decision making, d. Psychological empowerment) how the management should develop sustainable leadership for distributing green culture and improving employee green performance. Conclusions: Based on four solutions, the present research concludes that sustainable leadership for CEOs is not only of advantage in terms of protecting the environment and the people, but it fosters increased organizational learning. Increased organizational learning leads to better employee sustainable performance, which includes financial performance and the social and environmental initiatives the organization implements.

DDoS TCP Syn Flooding Backscatter Analysis Algorithm (DDoS TCP Syn Flooding Backscatter 분석 알고리즘)

  • Choi, Hee-Sik;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.55-66
    • /
    • 2009
  • In this paper, I will discuss how the Internet has spread rapidly in our lives. Large portals and social networks experience service attacks that access personal customers' databases. This interferes with normal service through DDoS (Distribute Denial of Service Attack), which is the topic I want to discuss. Among the types of DDoS, TCP SYN Flooding attacks are rarely found because they use few traffics and its attacking type is regular transaction. The purpose of this study is to find and suggest the method for accurate detection of the attacks. Through the analysis of TCP SYN Flooding attacks, we find that these attacks cause Backscatter effect. This study is about the algorithm which detects the attacks of TCP SYN Flooding by the study of Backscatter effect.

Factors Affecting the Intention to Distribute in Sort Plastic Waste of Vietnamese People: A Case Study in Ho Chi Minh City

  • Thai Dinh TRUONG;Thich Van NGUYEN
    • Journal of Distribution Science
    • /
    • v.21 no.8
    • /
    • pp.35-45
    • /
    • 2023
  • Purpose: This paper (1) identifies the factors that affect people's changing habits towards waste sorting, (2) evaluates the benefits of waste sorting to the environment and (3) designs communication strategies to change people's behavior and habits in sorting plastic waste in Ho Chi Mnh City, Vietnam. Research design, data and methodology: Using the data from 309 people that are living in Ho Chi Minh City and Structural Equation Modeling (SEM), to evaluate variables and test the hypotheses. Results: Research results show that attitudes, subjective standards, behavioral control, and facilities affect people's intention to classify plastic waste. We find that environmental concerns greatly influence people's attitudes. In contrast, environmental concerns have a relatively weaker effect on people's degree of behavioral control. Conclusion: Environmental protection is a matter of concern in the world. In Vietnam, this issue has been institutionalized into law to create a basis for improving the effectiveness of environmental protection activities. This article has some limitations. Firstly, sample is limited to HCMC residents; the study results are not representative of the entire population of Vietnam. This paper is based on cross-sectional data, which is not the best way to establish a causal relationship between the intention to sort plastic waste and its drivers.

A Large Scale Distributed Presence Service System by SIP Message Control Session (SIP 메시지 제어 세션에 의한 대용량 분산 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.514-520
    • /
    • 2018
  • Presence service provides various information about users such as locations, status of on/offline and network access methods, and number of presence resources required by each users increases largely in mobile environment. Therefore an effective method which can reduce load of presence servers is needed. In this paper, a large scale distributed presence service system which can distribute effectively total presence system load of presence servers using message control session has been presented. This large scale distributed presence service system provides various presence information for massive volumes of users. In this study, a new message control session architecture which can dynamically distribute loads of the presence servers to multiple servers has been presented, and a new presence information data architecture for controlling load of the presence servers has been designed. In this architecture, each presence server can exchange current load level in real time to get variance of the total system load change according to user numbers, and can distribute system load to maintain load level of each server evenly. The performance of the proposed large scale distributed presence service system has been analysed by experiments. The results has been showed that average presence resource subscription processing time reduced from 42.6% to 73.6%, and average presence notification processing time reduced from 37.6% to 64.8%.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Deterioration Evaluation of Railway Line Segments for Budget Distribution (예산배분을 위한 철도선로구간의 노후도 평가)

  • Kim, Seong-Ho;Choi, Chan-Yong;Na, Hee-Seung
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1802-1809
    • /
    • 2011
  • A distribution method of limited budget for rail line facility improvement is to use investment priorities of rail line segments based on their deterioration. In this paper we present an evaluation method of rail line segment deterioration which can be used to distribute limited budget. Rail line facilities include rail track, crossing, road bed, bridge, tunnel. These facilities deterioration and line shape can affect line segment deterioration. Deterioration evaluation method we present is a weighted sum of each component deterioration scores. The component weight can be obtained from experts using analytic hierarchy process.

  • PDF

Implementation of Power Distribute Unit (PDU) combined with Uninterruptible Power Supply (UPS) for DC Server System (DC 서버를 위한 무정전 전원 공급장치 결합형 전원분배장치 구현)

  • Kwon, Won-Ok;Kim, Hag-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.236-238
    • /
    • 2012
  • 본 논문은 저전력 데이터센터에 사용되는 DC 서버를 위한 고효율 DC UPS 결합형 전원분배장치의 구현과 설계에 관한 내용이다. 본 논문이 제안한 노드 준위 UPS 결합형 전원분배장치의 전력효율은 96%에 이르며 저전력 볼륨 서버의 전원공급장치(PSU)와 UPS를 대체할 수 있는 기술이다.

Supply Chain Management System based on extensible Markup Language(XML) (XML을 토대로 한 Supply Chain 관리시스템)

  • 이상태;주경수
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.75-78
    • /
    • 2000
  • SCM(Supply Chain Management) is concerned with the flow of product and information between the supply chain member organizations. Those organizations are suppliers, customers, producers, and service providers. They link together to acquire, purchase, manufacture, assemble, and distribute goods and services from suppliers to users. These flows are bidirectional. There(or is SCM specially important to integrate for efficient management. In this paper, is SCM based on XML(eXtensible Markup Language) studied.

  • PDF