• 제목/요약/키워드: Intellectual Property Transactions

검색결과 41건 처리시간 0.027초

Advanced Energy Detector with Correlated Multiple Antennas

  • Kim, Sungtae;Lim, Sungmook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4600-4616
    • /
    • 2021
  • In cognitive radio networks where unlicensed secondary users opportunistically access to licensed spectrum unused by licensed primary users, spectrum sensing is one of the key issues in order to effectively use the frequency resource. For enhancing the sensing performance in energy detection-based spectrum sensing, spatial diversity based on multiple antennas is utilized. However, the sensing performance can be degraded when antennas are spatially correlated, resulting in inducing the harmful interference to primary users. To overcome this problem, in this paper, an advanced energy detector is proposed. In the proposed sensing method, a weight matrix based on the eigenvalues of the spatial channels without any prior information on the primary signals is defined and utilized. In numerical simulations, it is shown that the proposed detector outperforms the conventional detector with regard to false-alarm and detection probabilities when antenna are spatially correlated.

민상사(民商事) 중재제도(仲裁制度)를 전제(前提)로 한 형사중재제도(刑事仲裁制度)의 도입방안(導入方案) (The introduction of a criminal case arbitration on premise the civil and commercial arbitration)

  • 남선모
    • 한국중재학회지:중재연구
    • /
    • 제19권3호
    • /
    • pp.93-119
    • /
    • 2009
  • Nowadays the number of crimes is increasing rapidly and society is getting more and more dangerous. Recently the criminal aspect of our society, the intelligence, diversity, localized area, as well as for the crime victims also difficult to predict the damage recovery is not easy to change their level of pain and are also serious. This phenomenon is increasingly expected to intensify, the proper response is a factory. The more so if the victim of murder. The criminal mediation working on the operational adjustments Borrower payment, Construction charges, investments and financial transactions due to interpersonal conflicts that occurred as a fraud, embezzlement, breach of trust property crimes such accused, individuals between the defamatory, offensive, encroachment, violating intellectual property rights and private Disputes about the complaint case and other criminal disputes submitted to mediation to resolve it deems relevant to the case who are accused. But the core of a detective control adjustment, adjust the members' representative to the region, including front-line player or a lawyer appointed by the attorney general at this time by becoming parties to this negative view may be ahead. Some scholars are criticizing the current criminal justice system for the absence of proper care for the criminal victims, as an alternative to the traditional criminal justice system. The introduction of the summary trial and related legal cases, the command structure, compensation system, crime victims' structural system can be seen as more classify, crime subject to victim's complaint, By case with a criminal misdemeanor in addition to disagree not punish criminal, minor offense destination, traffic offenders, regular property crime, credit card theft, intellectual property rights violators can be seen due to more categories can try. They sued in law enforcement, Prosecution case has been received and if any one party to the criminal detective Arbitration request arbitration by the parties can agree to immediately contact must be referred to arbitration within 15 days of when the arbitration case will be dismissed. These kinds of early results of the case related to, lawyers are involved directly in the arbitration shall be excluded. Arbitration system is the introduction of criminal justice agencies working to help resolve conflicts caused by adjustment problems will be able to. This article does not argue that we should stick to the traditional justice system as a whole. Instead it argues that the restrictive role of the traditional justice is to be preserved.

  • PDF

Hybrid Multi-System-on-Chip Architecture as a Rapid Development Approach for a High-Flexibility System

  • Putra, Rachmad Vidya Wicaksana;Adiono, Trio
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제5권1호
    • /
    • pp.55-62
    • /
    • 2016
  • In this paper, we propose a hybrid multi.system-on-chip (H-MSoC) architecture that provides a high-flexibility system in a rapid development time. The H-MSoC approach provides a flexible system-on-chip (SoC) architecture that is easy to configure for physical- and application-layer development. The physical- and application-layer aspects are dynamically designed and modified; hence, it is important to consider a design methodology that supports rapid SoC development. Physical layer development refers to intellectual property cores or other modular hardware (HW) development, while application layer development refers to user interface or application software (SW) development. H-MSoC is built from multi-SoC architectures in which each SoC is localized and specified based on its development focus, either physical or application (hybrid). Physical HW development SoC is referred to as physical-SoC (Phy-SoC) and application SW development SoC is referred to as application-SoC (App-SoC). Phy-SoC and App-SoC are connected to each other via Ethernet. Ethernet was chosen because of its flexibility, high speed, and easy configuration. For prototyping, we used a LEON3 SoC as the Phy-SoC and a ZYNQ-7000 SoC as the App-SoC. The proposed design was proven in real-time tests and achieved good performance.

이온 교환막 연료전지용 막 가습기의 물질전달 성능 실험 (Experimental Analysis of Mass Transfer Capability of Membrane Humidifier for PEMFC)

  • 탁현우;김경택;임석연;유상석
    • 한국수소및신에너지학회논문집
    • /
    • 제23권1호
    • /
    • pp.19-25
    • /
    • 2012
  • The efficiency and life time of the Proton Exchange Membrane fuel cell (PEMFC) system is critically affected by incoming gas with humidity which should be maintained properly at normal operating conditions. Typically, incoming gas of automotive fuel cell is humidified by external humidifier but the characteristics of device is rarely reported. In this study, characteristics of water transfer in the membrane humidifiers have been experimentally investigated for flow rates of gas and for different flow arrangement under steady state condition. At first, capability of mass transfer through the membrane is examined at constant temperature. Then, the temperature distribution effect on the capability of mass transfer is tested over various inlet conditions. In summary, this research presents the mass transfer capability of hydrophilic membrane over various operating conditions.

라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현 (Design & Implementation of License-based Digital Rights Management System)

  • 정연정;윤기송;류재철
    • 정보처리학회논문지C
    • /
    • 제11C권1호
    • /
    • pp.55-62
    • /
    • 2004
  • 웹 기술의 발전에 따라 누구나 인터넷을 통하여 다양한 종류의 정보와 미디어를 액세스할 수 있게 되었으나 이러한 접근은 저작권과 소유권 침해를 유발할 수 있다. 콘텐츠가 다운 로드된 이후에 콘텐츠를 보호할 수 있는 방안으로 콘텐츠에 대한 저작권을 보호하기 위해 DRM(Digital Rights Management) 기술이 연구되고 있는 상태이다. 본 논문에서는 인터넷 상에서 라이센스를 기반으로 하여 창조자, 배포자, 구매자 같은 유통단계의 각 참여자의 디지털 콘텐츠에 대한 저작권을 보호할 수 있는 시스템을 제안한다. 기존의 DRM 시스템이 배포자와 구매자사이의 유통을 지원하는 반면 본 시스템은 창조자에서 구매자로 이어지는 모든 유통 체인을 온라인으로 처리한다.

Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

  • Nam, Junghyun;Choo, Kim-Kwang Raymond;Kim, Moonseong;Paik, Juryon;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권12호
    • /
    • pp.3244-3260
    • /
    • 2013
  • A three-party password-based authenticated key exchange (PAKE) protocol allows two clients registered with a trusted server to generate a common cryptographic key from their individual passwords shared only with the server. A key requirement for three-party PAKE protocols is to prevent an adversary from mounting a dictionary attack. This requirement must be met even when the adversary is a malicious (registered) client who can set up normal protocol sessions with other clients. This work revisits three existing three-party PAKE protocols, namely, Guo et al.'s (2008) protocol, Huang's (2009) protocol, and Lee and Hwang's (2010) protocol, and demonstrates that these protocols are not secure against offline and/or (undetectable) online dictionary attacks in the presence of a malicious client. The offline dictionary attack we present against Guo et al.'s protocol also applies to other similar protocols including Lee and Hwang's protocol. We conclude with some suggestions on how to design a three-party PAKE protocol that is resistant against dictionary attacks.

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks

  • Hur, In;Kim, Moon-Seong;Seo, Jae-Wan;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권4호
    • /
    • pp.529-546
    • /
    • 2010
  • Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local information to forward packets to the destination and does not have to maintain the routing table, and thus it takes small overhead and has excellent scalability. However, the signal intensity reduces exponentially with the distance in realistic wireless sensor network, and greedy forwarding consumes a lot of energy, since it forwards the packets to the neighbor node closest to the destination. Previous proposed greedy forwarding protocols are the sender-based greedy forwarding that a sender selects a neighbor node to forward packets as the forwarding node and hence they cannot guarantee energy efficient forwarding in unpredictable wireless environment. In this paper, we propose the receiver-based greedy forwarding called RGF where one of the neighbor nodes that received the packet forwards it by itself. In RGF, sender selects several energy efficient nodes as candidate forwarding nodes and decides forwarding priority of them in order to prevent unnecessary transmissions. The simulation results show that RGF improves delivery rate up to maximum 66.8% and energy efficiency, 60.9% compared with existing sender-based greedy forwarding.

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.

독립형 신재생발전 시스템의 효율적인 운영을 위한 배터리 용량산정에 관한 연구 (A Study on Sizing of Battery for Effective Operation of Stand-alone Renewable Generation System)

  • 신희상;허재선;윤상윤
    • 전기학회논문지P
    • /
    • 제67권1호
    • /
    • pp.15-20
    • /
    • 2018
  • This paper presents the method of ESS energy capacity calculation for stand-alone renewable energy generation system consisting of photovoltaic energy. There is almost no power from photovoltaic system during sunless days. So this source is very weak in terms of the power supply reliability. To improve problem of power supply, battery is mainly used Energy Storage System(ESS). The number of sunless days and Depth of Discharge(DOD) is important factor to determine energy capacity of battery. However, a many study for economical design is required due to the high cost of ESS. In this paper, we propose the new method of ESS energy capacity calculation by applying different DOD for operation with and without sun. We determine the Battery capacity using higher DOD of operation during sunless day than the DOD of the normal operation. And we carried out an economic analysis of the calculation results.