• 제목/요약/키워드: Key Assignment

검색결과 83건 처리시간 0.025초

A Study on the RTC romote system of Water Environment for Wireless Network

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제7권4호
    • /
    • pp.465-468
    • /
    • 2009
  • There is to solution the environmental data which the importance is seriously taken into consideration in the the 21st century that is set up whether or not be a welfare society advanced country according to quality of life elevations through environments in question to a preferential assignment for an environmental control will decrease of measures, and be proceeded so as to be urgent. However, shall get measurement of a correct environmental pollution duty and reduction measures stopped on bases of the data which there is reliability, and decrease excessive pollution than what, and may overcome efficiency of waste of cost environmental pollution management. Environmental pollution data collected are regarded as important, and, specially, a collection of environmental data forecast a pollution circle, or to analyze future development is important very at an environmental policy decision or decision making step to be national besides pollution reductions.

Visual Cryptography Based on an Interferometric Encryption Technique

  • Lee, Sang-Su;Na, Jung-Chan;Sohn, Sung-Won;Park, Chee-Hang;Seo, Dong-Hoan;Kim, Soo-Joong
    • ETRI Journal
    • /
    • 제24권5호
    • /
    • pp.373-380
    • /
    • 2002
  • This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated nuder the proposed phase-assignment rule. For decryption, phase masks were placed on any path of the Mach-Zehnder interferometer. Through optical experiments, we confirmed that a secret binary image that was sliced could be recovered by the proposed method.

  • PDF

Evaluation of Advanced Structure-Based Virtual Screening Methods for Computer-Aided Drug Discovery

  • Lee, Hui-Sun;Choi, Ji-Won;Yoon, Suk-Joon
    • Genomics & Informatics
    • /
    • 제5권1호
    • /
    • pp.24-29
    • /
    • 2007
  • Computational virtual screening has become an essential platform of drug discovery for the efficient identification of active candidates. Moleculardocking, a key technology of receptor-centric virtual screening, is commonly used to predict the binding affinities of chemical compounds on target receptors. Despite the advancement and extensive application of these methods, substantial improvement is still required to increase their accuracy and time-efficiency. Here, we evaluate several advanced structure-based virtual screening approaches for elucidating the rank-order activity of chemical libraries, and the quantitative structureactivity relationship (QSAR). Our results show that the ensemble-average free energy estimation, including implicit solvation energy terms, significantly improves the hit enrichment of the virtual screening. We also demonstrate that the assignment of quantum mechanical-polarized (QM-polarized) partial charges to docked ligands contributes to the reproduction of the crystal pose of ligands in the docking and scoring procedure.

다중 역할 계층을 위한 암호학적인 키 할당 기법 (Cryptographic Key Assignment Solution For A Multi-Role Hierarchy)

  • 배경만;반용호;김종훈
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1205-1208
    • /
    • 2005
  • 구조적 문서에 대한 접근제어를 위해서 필수적으로 보안 계층에 대한 문제가 고려되어야 한다. 본 논문에서는 사용자가 가지는 보안계층, 즉 사용자 역할 계층에서의 접근제어 문제를 해결하기 위한 효율적인 키 관리 방법을 제안한다. 본 논문에서 제안된 방법은 OWHF(One-way Hash Function)를 이용하여 효과적으로 키를 할당하고 유도한다. 제안된 방법을 역할 계층 트리에서 역할의 추가와 삭제, 역할 계층의 갱신과 같은 동적 접근제어 문제에 적용하고 이를 분석한다.

  • PDF

Datacenter-Oriented Elastic Optical Networks: Architecture, Operation, and Solutions

  • Peng, Limei;Sun, Yantao;Chen, Min;Park, Kiejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.3955-3966
    • /
    • 2014
  • With the exponentially increasing Internet traffic and emergence of more versatile and heterogeneous applications, the design of datacenter networks (DCNs) is subject to unprecedented requirements for larger capacity and more flexible switching granularities. Envisioning Optical-Orthogonal Frequency Division Multiplexing (O-OFDM) as a promising candidate for such a scenario, we motivate the use of O-OFDM as the underlying switching technology in order to provide sufficient switching capacity and elastic bandwidth allocation. For this purpose, this article reviews the recent progresses of DCN deployment and assesses the scenario where the O-OFDM transmission and switching technology is employed in the underlying transport plane. We discuss the key issues of the datacenter-oriented O-OFDM optical networks, and in particular, elaborate on a number of open issues and solutions including system interconnection architecture, routing and resource assignment, survivability, and energy-efficiency.

Systematic Review of Bug Report Processing Techniques to Improve Software Management Performance

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.967-985
    • /
    • 2019
  • Bug report processing is a key element of bug fixing in modern software maintenance. Bug reports are not processed immediately after submission and involve several processes such as bug report deduplication and bug report triage before bug fixing is initiated; however, this method of bug fixing is very inefficient because all these processes are performed manually. Software engineers have persistently highlighted the need to automate these processes, and as a result, many automation techniques have been proposed for bug report processing; however, the accuracy of the existing methods is not satisfactory. Therefore, this study focuses on surveying to improve the accuracy of existing techniques for bug report processing. Reviews of each method proposed in this study consist of a description, used techniques, experiments, and comparison results. The results of this study indicate that research in the field of bug deduplication still lacks and therefore requires numerous studies that integrate clustering and natural language processing. This study further indicates that although all studies in the field of triage are based on machine learning, results of studies on deep learning are still insufficient.

An Automatic Generation Method of Traceability Links from Requirement to Design in Business Applications

  • Soojin Park
    • Journal of Platform Technology
    • /
    • 제11권5호
    • /
    • pp.3-15
    • /
    • 2023
  • Requirements traceability link information is the basis for determining whether requirement change requested throughout the software development life cycle should be reflected in the system. Setting up complete requirements traceability links requires considerable effort. However, the commensurate benefits can be obtained in later development or further maintenance phases. For this reason, setting up and managing requirements traceability links in the software development phase are tasks that cause considerable resistance to developers. This study proposes a method for generating requirement traceability links in business applications. The key feature of the proposed method is that the traceability link from the requirements element, which is the basis of the corresponding element to the analysis element, is automatically established at the same time the elements of the analysis model are identified. This can be a way to reduce developer effort while increasing the efficiency of the traceability model. A case study on a Course Registration System demonstrates the feasibility of applying the proposed requirements traceability management method to actual software development.

  • PDF

DWDM 기반의 차세대 인터넷에서 QoS서비스 제공을 위한 QoS-based RWA 알고리즘 (QoS-based RWA Algorithm for providing QoS Services in the Next Generation Internet based on DWDM)

  • 배정현;송현수;김성운;김영부;조기성;이현진
    • 대한전자공학회논문지TC
    • /
    • 제40권12호
    • /
    • pp.27-37
    • /
    • 2003
  • 다양한 실시간 멀티미디어 서비스들을 전송하는 DWDM(Dense-Wavelength Division Multiplexing) 기반의 차세대 인터넷에서는 DWDM망의 다양한 QoS(Quality of Service) 파라미터들을 복합적으로 고려하는 QoS RWA(Routing and Wavelength Assignment) 방식으로의 접근이 요구되어진다. 그러나 일반적으로 다중 제약조건을 만족하는 최적의 경로를 찾는 것은 NP-complete한 문제로서, 파장 연속성가지 고려해야 하는 DWDM 망에서는 QoS RWA 분야에 대한 연구가 아직 미비한 실정이다. 따라서 본 논문에서는 QoS RWA 수행하기 위한 방안으로 flooding 기법을 확장하여 경로 설정에 대한 계산과 구현을 간소화시킨 QPR(Qualified Path Routing) 알고리즘을 제안한다. 또한 QPR 알고리즘을 기반으로 광신호 품질, 광자원(파장), 생존성 및 파장 연속성까지 고려하여 차등적인 QoS 지원하는 QoS-based RWA 알고리즘을 제안하며, 블록률, 라우팅 오버헤드 및 생존성 측면의 성능 평가를 통해 제안된 알고리즘들의 효율성을 검증하였다.

A new method for optimal selection of sensor location on a high-rise building using simplified finite element model

  • Yi, Ting-Hua;Li, Hong-Nan;Gu, Ming
    • Structural Engineering and Mechanics
    • /
    • 제37권6호
    • /
    • pp.671-684
    • /
    • 2011
  • Deciding on an optimal sensor placement (OSP) is a common problem encountered in many engineering applications and is also a critical issue in the construction and implementation of an effective structural health monitoring (SHM) system. The present study focuses with techniques for selecting optimal sensor locations in a sensor network designed to monitor the health condition of Dalian World Trade Building which is the tallest in the northeast of China. Since the number of degree-of-freedom (DOF) of the building structure is too large, multi-modes should be selected to describe the dynamic behavior of a structural system with sufficient accuracy to allow its health state to be determined effectively. However, it's difficult to accurately distinguish the translational and rotational modes for the flexible structures with closely spaced modes by the modal participation mass ratios. In this paper, a new method of the OSP that computing the mode shape matrix in the weak axis of structure by the simplified multi-DOF system was presented based on the equivalent rigidity parameter identification method. The initial sensor assignment was obtained by the QR-factorization of the structural mode shape matrix. Taking the maximum off-diagonal element of the modal assurance criterion (MAC) matrix as a target function, one more sensor was added each time until the maximum off-diagonal element of the MAC reaches the threshold. Considering the economic factors, the final plan of sensor placement was determined. The numerical example demonstrated the feasibility and effectiveness of the proposed scheme.

가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법 (Optical encryption and decryption technique using virtual image in frequency domain)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • 한국광학회지
    • /
    • 제14권3호
    • /
    • pp.255-259
    • /
    • 2003
  • 본 논문에서는 위상 변조된 가상 영상과 결합변환상관기를 이용하여 암호화 및 복호화 수준을 향상시키는 방법을 제안하였다. 원 영상은 주파수 영역에서 가상 위상 영상과 무작위 위상 영상의 곱을 퓨리에 변환하여 만든 암호화 영상과 제안한 위상 대응 규칙으로 만든 퓨리에 복호화 키를 퓨리에 변환하여 출력 평면에서 간단히 복원된다. 제안한 방법은 암호화된 영상을 허가되지 않은 사람들이 분석함으로써 있을 수 있는 복제 가능성을 원 영상의 어떤 정보도 포함하지 않은 가상 영상을 사용함으로써 배제할 수 있다. 또한 위상 변조된 영상의 자기상관성분의 세기는 1이므로 원 영상은 이 자기상관성분을 이용하여 재생되므로 결합변환상관기의 가장 큰 문제점인 자기상관성분을 제거해야 하는 문제를 해결할 수 있다 하지만 위상 암호화방법은 잡음이나 흠집에 민감하여 복원영상의 왜곡이 발생할 수 있으므로 본 논문에서는 이 문제를 분석하고 해결책을 제시하였다. 검증 실험을 통하여 분석의 타당성을 확인하고 제안한 암호화 방법이 광 암호화 시스템에 적용 가능함을 확인하였다.