• 제목/요약/키워드: Flexible box

Search Result 77, Processing Time 0.019 seconds

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.

Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System (칩셋 페어링 접근제한시스템 환경에서 다중 셋톱박스를 지원하는 키 분배 기법)

  • Lee, Hoon-Jung;Son, Jung-Gab;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.39-46
    • /
    • 2012
  • In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.

Spatial mechanical behaviors of long-span V-shape rigid frame composite arch bridges

  • Gou, Hongye;Pu, Qianhui;Wang, Junming;Chen, Zeyu;Qin, Shiqiang
    • Structural Engineering and Mechanics
    • /
    • v.47 no.1
    • /
    • pp.59-73
    • /
    • 2013
  • The Xiaolan channel super large bridge is unique in style and with greatest span in the world with a total length of 7686.57 m. The main bridge with spans arranged as 100m+220m+100m is a combined structure composed of prestressed concrete V-shape rigid frame and concrete-filled steel tubular flexible arch. First of all, the author compiles APDL command flow program by using the unit birth-death technique and establishes simulation calculation model in the whole construction process. The creep characteristics of concrete are also taken into account. The force ratio of the suspender, arch and beam is discussed. The authors conduct studies on the three-plate webs's rule of shear stress distribution, the box girder's longitudinal bending normal stress on every construction stage, meanwhile the distribution law of longitudinal bending normal stress and transverse bending normal stress of completed bridge's box girder. Results show that, as a new combined bridge, it is featured by: Girder and arch resist forces together; Moment effects of the structure are mainly presented as compressed arch and tensioned girder; The bridge type brings the girder and arch on resisting forces into full play; Great in vertical stiffness and slender in appearance.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Hydroelastic analysis of a truss pontoon Mobile Offshore Base

  • Somansundar, S.;Selvam, R. Panneer;Karmakar, D.
    • Ocean Systems Engineering
    • /
    • v.9 no.4
    • /
    • pp.423-448
    • /
    • 2019
  • Very Large Floating Structures (VLFS) are one among the solution to pursue an environmentally friendly and sustainable technology in birthing land from the sea. VLFS are extra-large in size and mostly extra-long in span. VLFS may be classified into two broad categories, namely the pontoon type and semi-submersible type. The pontoon-type VLFS is a flat box structure floating on the sea surface and suitable in regions with lower sea state. The semi-submersible VLFS has a deck raised above the sea level and supported by columns which are connected to submerged pontoons and are subjected to less wave forces. These structures are very flexible compared to other kinds of offshore structures, and its elastic deformations are more important than their rigid body motions. This paper presents hydroelastic analysis carried out on an innovative VLFS called truss pontoon Mobile Offshore Base (MOB) platform concept proposed by Srinivasan and Sundaravadivelu (2013). The truss pontoon MOB is modelled and hydroelastic analysis is carried out using HYDRAN-XR* for regular 0° waves heading angle. Results are presented for variation of added mass and damping coefficients, diffraction and wave excitation forces, RAOs for translational, rotation and deformational modes and vertical displacement at salient sections with respect to wave periods.

SDN-Based Collection-path Steering for IoT-Cloud Service Monitoring Data over SmartX-mini Playground (SmartX-mini Playground 상의 IoT-Cloud 서비스에 대한 SDN 기반 모니터링 데이터 수집 경로 설정)

  • Yoon, Heebum;Kim, Seungryong;Kim, JongWon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1598-1607
    • /
    • 2016
  • Safe transmitting monitoring data is essential for supporting IoT-Cloud services efficiently. In this paper, we find ways to configure data path flexibly in SDN based for IoT-Cloud services utilizing SmartX-mini Playground. To do this, we use ONOS(Open Network Operating System) SDN Controller, ONOS NBI Applications made from us to check flexible and safe data path configuration for IoT-Cloud monitoring data transmitting in real IoT-SDN-Cloud environments.

선형가속기를 이용한 뇌정위 방사선수술시 Isocentric sub system의 기하학적 오차

  • 이석춘;오종영;김남석
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.7 no.1
    • /
    • pp.45-53
    • /
    • 1995
  • 목적 : 뇌정위 방사선수술은 AVM(ateriovenous malformation)이나 작은 크기의 종양에 1회에 고선량의 방사선을 조사하는 기술이다. 선형가속기를 이용한 방사선 수술을 하기 위하여 최근 본원에 설치한 Philips SL 75-5 선형가속기와 isocentric sub system(ISS)에 의한 뇌정위 방사선 수술에 있어서 표적의 위치선정과, gantry와 couch의 회전시 기하학적 오차가 중요시 되는데 isocentric sub system의 오차를 분석 하였다. 대상 및 방법 : 방사선원으로는 Philips SL 75-5 선형가속기의 5MV 광자선을 사용하였고, 원형의 작은 광자선속을 위하여 isocenter에서의 직경이 26mm인 secondary cone을 gimbal baaring에 삽입하여 사용하였다. 표적의 크기와 좌표를 정하기 위하여 CT나 angio localizer를 이용하고, 표적좌표 선정을 위하여 BRW phantom base와 target pointer를 이용하여 임의의 BRW-coordinator를 바꾸어 가면서 gantry angle와 ISS head 각도를 임의로 바꾸어 가면서 film에 방사선을 조사하였다. 흑화된 film을 view box 위에 놓고 광학판독기구로 film 가장자리의 오차를 scale 확대경으로 측정하여 오차를 분석하였다. 결과 : 표적좌표 선정의 정확도를 확인하기 위하여 임의의 표적좌표에 gantry의 10개각도 ISShead의 10개각도에서 각각 광자선을 조사시켜 film을 이용하여 오차를 측정한 결과 collimator cone의 직경이 26mm일때 전체 평균오차가 0.219+-0.03mm이었다. 결론 : Isocentric sub system은 gantry head와 ISS arm 사이에 gimbal bearing이 있어서 이 부위를 flexible하게 연결함으로 gantry의 회전에 무관하게 정확한 isocenter를 유지시켜 주고 ISS head는 couch와 독립되어 움직이므로 isocentric sub system isocenter의 오차를 최대한 줄일수 있음을 알았다.

  • PDF

A Study on the Adaptive Polynomial Neuro-Fuzzy Networks Architecture (적응 다항식 뉴로-퍼지 네트워크 구조에 관한 연구)

  • Oh, Sung-Kwun;Kim, Dong-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.50 no.9
    • /
    • pp.430-438
    • /
    • 2001
  • In this study, we introduce the adaptive Polynomial Neuro-Fuzzy Networks(PNFN) architecture generated from the fusion of fuzzy inference system and PNN algorithm. The PNFN dwells on the ideas of fuzzy rule-based computing and neural networks. Fuzzy inference system is applied in the 1st layer of PNFN and PNN algorithm is employed in the 2nd layer or higher. From these the multilayer structure of the PNFN is constructed. In order words, in the Fuzzy Inference System(FIS) used in the nodes of the 1st layer of PNFN, either the simplified or regression polynomial inference method is utilized. And as the premise part of the rules, both triangular and Gaussian like membership function are studied. In the 2nd layer or higher, PNN based on GMDH and regression polynomial is generated in a dynamic way, unlike in the case of the popular multilayer perceptron structure. That is, the PNN is an analytic technique for identifying nonlinear relationships between system's inputs and outputs and is a flexible network structure constructed through the successive generation of layers from nodes represented in partial descriptions of I/O relatio of data. The experiment part of the study involves representative time series such as Box-Jenkins gas furnace data used across various neurofuzzy systems and a comparative analysis is included as well.

  • PDF

Packing placement method using hybrid genetic algorithm for segments of waste components in nuclear reactor decommissioning

  • Kim, Hyong Chol;Han, Sam Hee;Lee, Young Jin;Kim, Dai Il
    • Nuclear Engineering and Technology
    • /
    • v.54 no.9
    • /
    • pp.3242-3249
    • /
    • 2022
  • As Kori unit 1 is undergoing the decommissioning process, estimating the disposal amount of waste from the decommissioned nuclear reactor has become one of the challenging issues. Since the waste disposal amount estimation depends on the packing of the waste, it is highly desirable to optimize the waste packing plan. In this study, we developed an efficient scheme for packing waste component segments. The scheme consists of 1) preparing three-dimensional models of segments, 2) orienting each segment in such a way to minimize the bounding box volume, and 3) applying hybrid genetic algorithm to pack the segments in the disposal containers. When the packing solution converges in the algorithm, it comes up with the number of containers used and the placement of segments in each container. The scheme was applied to Kori-1 reactor pressure vessel. The required number of containers calculated by the developed scheme was 24 compared to 42 that was the estimation of the prior packing plan, resulting in disposal volume savings by more than 40%. The developed method is flexible for applications to various packing problems with waste segments from different cutting options and different sizes of containers.

Drug distribution management system based on IoT

  • Liu, Zeliang;Zhang, Chunmei;Peng, Hui;Xu, Qin;Gao, Yubao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.424-444
    • /
    • 2022
  • In hospitals and pharmacies, the distribution of medicines is an important part. Any mistakes, misses, fake medicines and expired medicines can cause medical accidents. With the widespread application of the Internet of Things technology (IoT), traditional drug distribution methods need to be upgraded. This article proposes a drug distribution management scheme based on the Internet of Things technology. In the production of drugs, a flexible RFID tag was printed on the packaging box, which stored a series of information such as drug name, dosage, raw materials, efficacy, production date, expiration date, and manufacturer. The use of a drug distribution management system combined with RFID readers can identify drug information and effectively prevent the occurrence of erroneous, missed, counterfeit, and expired drugs. It can also improve management efficiency, reduce management costs, and control management risks. Through the circuit design and software system development, the test results show that this solution is effective and feasible, the proposed method can achieve the expected results.