• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.031 seconds

Design and Implementation MoIP Wall-pad platform using ARM11 (ARM11 을 이용한 MoIP 월패드 플랫폼 구현)

  • Jung, Yong-Kuk;Kim, Dae-Sung;Heo, Kwang-Seon;Kweon, Min-Su;Choi, Young-Gyu
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.46-49
    • /
    • 2011
  • This paper is to implement MoIP platform to send and receive video and audio at the same time by using high-performance Dual Core Processor. Even if Wall-Pad key component of a home network system is released by using embedded processors, it's lacking of performance in terms of multimedia processing and feature of video telephony through which video and voice are exchanged simultaneously. The main reason could be that embedded processors currently being used do not provide enough performance to support both MoIP call features and various home network features simultaneously. In order to solve these problems, Dual processor could be used, but in the other hands it brings another disadvantage of high cost. Therefore, this study is to solve the home automation features and video telephony features by using Dual Core Processor based on ARM 11 Processor and implement the MoIP Wall-Pad which can reduce the board design costs and component costs, and improve performance. The platform designed and implemented in this paper verified performance of MoIP to exchange the video and voice at the same time under the situation of Ethernet network.

Implementation and performance analysis of authentication and key exchange protocol with post-quantum cryptography in grid computing system (그리드 컴퓨팅 시스템에서의 양자내성암호 기반 사용자 인증 및 키 교환 프로토콜 구현 및 성능 측정)

  • Jae-Yeong Han;Je-Hyun Hwang;Jae-Seok Lee;Young-Jun Lee;In-Hee Lee;Je-Won Lee;Sung-Wook Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.427-430
    • /
    • 2024
  • 본 논문에서는 그리드 컴퓨팅에서의 안전한 통신을 위한 양자내성암호 기반 사용자 인증 및 키 교환 프로토콜을 구현하고 성능을 측정한다. 디지털 서명을 통해 사용자를 검증하고 암호키를 교환하여 신뢰할 수 있는 사용자들만이 그리드 컴퓨팅에 참여할 수 있도록 한다. 사용자 인증과 키 교환 과정에 NIST 선정 표준양자내성암호인 ML-DSA와 ML-KEM을 적용하여 양자컴퓨터를 이용한 공격에도 안전할 것으로 기대된다. 본 논문에서는 양자내성암호를 적용한 프로토콜이 기존의 현대암호 기반 전자서명이나 키 교환 과정에 비해 양자내성과 동시에 준수한 사용성을 지녔음을 보인다. 이를 통해 그리드 컴퓨팅의 시스템의 P2P 특성에서 기인하는 보안 문제를 해결하고, 기존에 주로 내부망이나 실시간 스트리밍 서비스에서 활용되던 그리드 컴퓨팅의 인터넷 환경으로의 확장 가능성을 제시한다.

  • PDF

Digital Transformation of Agriculture Supply Chain in Vietnam: Current Status and Proposal of Roadmap

  • Quoc Cuong Nguyen;Hoang Tuan Nguyen
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • As the main driver of economic growth and employment, the agricultural sector plays an important role in Vietnam's economy. However, in recent years, the sector has faced new challenges and also presented new investment opportunities to stimulate agricultural growth. Many Vietnamese agricultural producers currently lack the modern technology and decision support tools needed to maintain and improve productivity in a rapidly changing environment. Other stakeholders in the agricultural value chain, such as input suppliers, distributors, and consumers, also face significant challenges, including disrupted value chains, transportation costs. The cost of transporting goods across the supply chain continues to increase and information exchange remains fragmented. A potential solution to address these challenges is the application of digital transformation in agricultural supply chains. Farmers and other value chain participants can improve the production of their goods and procedures by utilizing new and cutting-edge technologies that are integrated into a unified system as part of the digital transformation of agricultural supply chains. In this study, we evaluate the current status of digital transformation in the supply chain of the agriculture industry by finding and examining pertinent publications from key agencies as well as prior research. From there, in the framework of the digital economy, this study suggests a digital transformation roadmap for the agricultural supply chain.

Organizational Factors Influencing Inclination to Use a B2B Website by a Buyer-Supplier Dyad: The Indian Context

  • Merlin Nandy
    • Asia pacific journal of information systems
    • /
    • v.29 no.3
    • /
    • pp.328-358
    • /
    • 2019
  • Business-to-Business electronic commerce websites are a common form of inter-organizational systems that span organizational boundaries and enables organizations to exchange information in a seamless fashion. To reap the desired benefits it is important that the website be used in the intended manner. The level and extent of use of a business-to-business website depends partly on the inclination to use the website by the users in the primary organization and in the user organizations independently and the combined inclination of the organizations together. This combined inclination is referred to as the System Inclination, with dominance playing a key role. Each organization has certain characteristics of its own and may differ significantly in their inclination to use. It is important to analyze the factors that determine this inclination to use, so that organizations can adopt appropriate management mechanisms to control it. This paper proposes a framework to explain the organizational factors and their influence on the inclination to use a website, based on study of four Indian buyer-supplier dyads. Inclination to use is found to be influenced by factors like top management support, website characteristics, adequate support mechanisms, user group orientation towards electronic commerce and basic IT drive among the employees, at both the primary and user organizations.

A SD approach to the Efficiency Improvement of Electric Power Industry in Korea -Focused on the Nuclear Industry (국내 전력산업의 효율성 제고모형에 대한 SD 모형 연구 - 원자력산업을 중심으로)

  • Heo, Hoon;Lee, Myung-Ho
    • Korean System Dynamics Review
    • /
    • v.4 no.2
    • /
    • pp.153-171
    • /
    • 2003
  • In this study, we tried to build a model which can deal with the efficient and effective operation of electric power industry, especially focused on the nuclear industry. Here, SD(system Dynamics) approach is used to visualize the underlying phenomenon of the nuclear power industry. SD is a methodology for studying and managing complex feedback systems, such as one finds in business and other social systems, The span of SD applications has grown extensively and now encompasses work in corporate planning and policy design, public management and policy, biological and medical modeling, energy and the environment. Recently, according to the report from KEPCO(Korea Electric Power Corporation), they are considering delaying a new power plant construction. It may be based upon business fluctuation downsized from Korean economic crisis in 1997 and freezing of construction funds due to unstable foreign exchange rate. At this point, we need desperately a kind of strategic model that would contribute to cope with the current business situation, energy generation, Production, and resulting Pollution. Specifically, this model, using SD approach, starts with the detailed drawing of influence diagram, which describes those relevant key points on nuclear power generation systems in electric power industry of Korea. These include such (actors as the operation of nuclear industry and parameters related to the decision making for business policy. Based upon the above-mentioned influence diagram drawn, we developed SD simulation model to evaluate and analyze strategic management of KBPCO. Based on our analysis, we could demonstrate how simulation model can be applied to the real electric power generation in Korea.

  • PDF

A Framework Design of an Active Supply Chain Risk Management System from the Perspective of Shippers (화주 중심의 능동적인 공급망 위험관리 시스템의 프레임워크 설계)

  • Song, Byung-Jun;Ahn, Hye-Jeong;Rhee, Jong-Tae;Lee, Jong-Yun
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.151-158
    • /
    • 2011
  • For the purpose of cost saving and sales promotion, various industry companies have introduced logistics management techniques in their field. However, enterprises faced to damages because proper products can not be provided to customers in basic logistics 3S1L(speedy, safely, surely, and low) principles for environments changing rapidly and inflexible business processes. So, we need the ability in coping with risk to handle this phenomenon. In particular, the shipper of key decisions of supply chain risk management requires continuous exchange and collection of logistics information in the third-party logistics. However the current SCRMS(Supply Chain Risk Management System) is not sufficient to cover the shipper's various needs and to recognize and respond to emergency situations. Therefore, this paper proposes an active SCRMS framework through the reconsideration about the previous research on SCRM and rearrangement of risk factors for coping with those problems. in addition, it verifies an efficiency through a stability comparison with the current system.

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

Elucidation of the physiological basis related to high photosynthetic capacity of soybean local variety, 'Peking'.

  • Sakoda, Kazuma;Suzuki, Seita;Tanaka, Yu;Shiraiwa, Tatsuhiko
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.239-239
    • /
    • 2017
  • The enhancement of leaf photosynthetic capacity can have the potential to improve the seed yield of soybean. Key targets for the increase of leaf photosynthetic capacity remains unclear in soybean. Peking, Chinese local variety, has been the useful material for soybean breeding since it shows various resistances against biotic and abiotic stress. Sakoda et al., 2017 reported that Peking had the higher capacity of leaf photosynthesis than Enrei, Japanese elite cultivar. They identified the genetic factors related to high photosynthetic capacity of Peking. The objective of this study is to elucidate the physiological basis underlying high photosynthetic capacity of Peking. Peking and Enrei were cultivated at the experimental field of the Graduate School of Agriculture, Kyoto University, Kyoto, Japan. The sowing date was July 4, 2016. Gas exchange parameters were evaluated at the uppermost fully expanded leaves on 43, 49, and 59 days after planting (DAP) with a portable gas exchange system, LI-6400. The leaf hydraulic conductance, $K_{leaf}$, was determined based on the water potential and transpiration rate of the uppermost fully expanded leaves on 60 DAP. The morphological traits related to leaf photosynthesis were analyzed at the same leaves with the gas exchange measurements. The light-saturated $CO_2$ assimilation rate ($A_{sat}$) of Peking was significantly higher than that of Enrei at 43 and 59 DAP while the stomatal conductance ($g_s$) of Peking was significantly higher at all the measurements (p < 0.05). It suggested that high $A_{sat}$ was mainly attributed to high $g_s$ in Peking. $g_s$ is reported to be affected by the morphological traits and water status inside the leaf, represented by $K_{leaf}$, in crop plants. The tendency of the variation of the stomatal density between two cultivars was not consistent throughout the measurements. On the other hand, $K_{leaf}$ of Peking was 59.0% higher than that of Enrei on 60 DAP. These results imply that high $g_s$ might be attributed to high $K_{leaf}$ in Peking. Further research is needed to reveal the mechanism to archive high $g_s$ on the basis of water physiology in Peking. The knowledge combining the genetic and physiological basis underlying high photosynthetic capacity of Peking can be useful to improve the biomass productivity of soybean.

  • PDF

A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication (실시간 상호인증 지원을 위한 무선랜 보안시스템에 관한 연구)

  • Lee Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.161-170
    • /
    • 2005
  • The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP)has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802. 1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was Protected. And the designed user authentication and key exchange protocols were Proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.

  • PDF

A Framework for Time Awareness System in the Internet of Things (사물인터넷에서 시각 정보 관리 체계)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1069-1073
    • /
    • 2016
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.